This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP New Zealand Day 2013"
Nick Freeman (talk | contribs) |
Nick Freeman (talk | contribs) |
||
(14 intermediate revisions by 2 users not shown) | |||
Line 2: | Line 2: | ||
<center> | <center> | ||
[https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013 https://www.owasp.org/images/3/3e/OWASP_NZ_Day_2013_logo.png]<br><br> | [https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2013 https://www.owasp.org/images/3/3e/OWASP_NZ_Day_2013_logo.png]<br><br> | ||
− | '''11th and | + | '''11th and 12th September 2013 - Auckland''' |
</center> | </center> | ||
---- | ---- | ||
Line 23: | Line 23: | ||
==Registration== | ==Registration== | ||
− | Registration for the main conference day is now open: [https://registration.owasp.org.nz/ | + | Registration is now closed. |
+ | |||
+ | <!-- | ||
+ | Registration for the main conference day is now open: [https://registration.owasp.org.nz/ Conference Registration Here] | ||
There is no cost for the main conference day and lunch is provided. We do ask that if at any point you realise you cannot make it please cancel your registration to make room for others as spaces are limited. | There is no cost for the main conference day and lunch is provided. We do ask that if at any point you realise you cannot make it please cancel your registration to make room for others as spaces are limited. | ||
− | Training | + | Training Registration is now open: [http://www.regonline.com/owaspnzday2013trainingandsponsorship Training Registration] |
− | + | --> | |
==Important dates== | ==Important dates== | ||
Line 39: | Line 42: | ||
* Conference Day date: 12th September 2013 | * Conference Day date: 12th September 2013 | ||
+ | For those of you booking flights, ensure you can be at the venue at 8:30am, the conference will end by 5:30pm however we will have post conference drinks at a local drinking establishment for those interested. | ||
==Conference Venue== | ==Conference Venue== | ||
Line 115: | Line 119: | ||
Please direct all enquiries to [email protected] and [email protected]. | Please direct all enquiries to [email protected] and [email protected]. | ||
+ | |||
+ | |||
+ | |||
+ | = Presentations = | ||
+ | ==Presentations== | ||
+ | <center> | ||
+ | 12th September 2013 | ||
+ | <table width="80%"> | ||
+ | <tr> | ||
+ | <td width="7%" valign="top">08:30</td> | ||
+ | <td colspan="2" style="background-color: #8595C2">Registration</td> | ||
+ | </tr> | ||
+ | |||
+ | <tr> | ||
+ | <td width="7%" valign="top">09:00</td> | ||
+ | <td colspan="2" style="background-color: #EEE; text-align: center"> | ||
+ | <b>Welcome to OWASP New Zealand Day 2013</b><br /> | ||
+ | <i>Nick Freeman and Adrian Hayes (OWASP Leaders)</i> | ||
+ | </td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td width="7%" valign="top">09:10</td> | ||
+ | <td colspan="2" style="background-color: #B9C2DC; text-align: center"> | ||
+ | <b>[http://www.slideshare.net/fmarier/persona-owaspdaynz Securing the Web Without Site-Specific Passwords]</b><br /> | ||
+ | <i>Francois Marier - Mozilla</i> | ||
+ | </td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td width="7%" valign="top">09:50</td> | ||
+ | <td colspan="2" style="background-color: #EEE; text-align: center"> | ||
+ | <b>[http://www.slideshare.net/kimcarter75098/user-inputsanitisation What's Our Software Doing With All That User Input]</b><br /> | ||
+ | <i>Kim Carter - BinaryMist</i> | ||
+ | </td> | ||
+ | </tr> | ||
+ | |||
+ | <tr> | ||
+ | <td width="7%" valign="top">10:30</td> | ||
+ | <td colspan="2" style="background-color: #D98B66; text-align: center"> | ||
+ | <b>Break for Morning Tea</b><br /> | ||
+ | </td> | ||
+ | </tr> | ||
+ | |||
+ | <tr> | ||
+ | <td width="7%" valign="top">11:00</td> | ||
+ | <td colspan="2" style="background-color: #EEE; text-align: center"> | ||
+ | <b>[http://slides.torus.co.nz/owasp-nz/mahara-slides Bug Chaining (aka, why XSS can be worse than you think)]</b><br /> | ||
+ | <i>Hugh Davenport - Aura RedEye Security</i> | ||
+ | </td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td width="7%" valign="top">11:30</td> | ||
+ | <td colspan="2" style="background-color: #B9C2DC; text-align: center"> | ||
+ | <b>[https://www.owasp.org/images/6/6f/MarkPiper-OWASP-0130900.pdf OWASP Top 10 Mobile Risks - An Introduction By Case Study]</b><br /> | ||
+ | <i>Mark Piper - Insomnia Security</i> | ||
+ | </td> | ||
+ | </tr> | ||
+ | |||
+ | <tr> | ||
+ | <td width="7%" valign="top">12:30</td> | ||
+ | <td colspan="2" style="background-color: #D98B66; text-align: center"> | ||
+ | <b>Break for Lunch</b><br /> | ||
+ | </td> | ||
+ | </tr> | ||
+ | |||
+ | <tr> | ||
+ | <td width="7%" valign="top">13:30</td> | ||
+ | <td style="background-color: #EEE; text-align: center"> | ||
+ | <b>[https://www.owasp.org/images/2/23/HAAS_OWASP_NZ_13-Improving_XPath_Injection.pdf Improving XPath Injection with Binary Search Optimizations]</b><br /> | ||
+ | <i>Paul Haas - Security-Assessment.com</i> | ||
+ | </td> | ||
+ | <td style="background-color: #EEE; text-align: center"> | ||
+ | <b>[https://www.owasp.org/images/1/19/Presentation_-_Nothing_to_See_Here_%28OWASP%29_%2809_2013%29.pdf Nothing to See Here!]</b><br /> | ||
+ | <i>Andrew Kelly</i> | ||
+ | </td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td width="7%" valign="top">14:15</td> | ||
+ | <td rowspan="2" style="background-color: #B9C2DC; ; text-align: center"> | ||
+ | <b>[https://www.owasp.org/images/b/b8/2013-09-12-JacksonProw-SpideySense-final.pdf Bad Smells That Lead to Bad Security]</b><br /> | ||
+ | <i>Kirk Jackson - Xero and Andy Prow - Aura</i> | ||
+ | </td> | ||
+ | <td style="background-color: #B9C2DC; ; text-align: center"> | ||
+ | <b>[https://www.owasp.org/images/b/b4/OWASP_2013_HH_v01.pdf Evolution of threats and the skills in your security team]</b><br /> | ||
+ | <i>Hinne Hettema - University of Auckland</i> | ||
+ | </td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td width="7%" valign="top">14:45</td> | ||
+ | |||
+ | <td rowspan="2" style="background-color: #EEE; text-align: center"> | ||
+ | <b>[https://www.owasp.org/images/e/ef/OWASP2013_-_Responsible_Disclosure.pdf Security Vulnerability Disclosure]</b><br /> | ||
+ | <i>Nick von Dadelszen - Lateral Security</i> | ||
+ | </td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td width="7%" valign="top">15:00</td> | ||
+ | <td style="background-color: #EEE; text-align: center"> | ||
+ | <b>[http://eastman.net.nz/~tom/serialization/# Serialization formats aren't toys]</b><br /> | ||
+ | <i>Tom Eastman - Catalyst IT</i> | ||
+ | </td> | ||
+ | </tr> | ||
+ | |||
+ | <tr> | ||
+ | <td width="7%" valign="top">15:30</td> | ||
+ | <td colspan="2" style="background-color: #D98B66; text-align: center"> | ||
+ | <b>Break for Afternoon Tea</b><br /> | ||
+ | </td> | ||
+ | </tr> | ||
+ | |||
+ | <tr> | ||
+ | <td width="7%" valign="top">16:00</td> | ||
+ | <td colspan="2" style="background-color: #EEE; text-align: center"> | ||
+ | <b>Discussion Panel</b><br /> | ||
+ | <i>An open discussion with our speakers on current security topics</i> | ||
+ | </td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td width="7%" valign="top">16:30</td> | ||
+ | <td colspan="2" style="background-color: #B9C2DC; text-align: center"> | ||
+ | <b>Wrap Up</b><br /> | ||
+ | <i>Time for the pub, for those interested</i> | ||
+ | </td> | ||
+ | </tr> | ||
+ | |||
+ | </table> | ||
+ | </center> | ||
+ | |||
Line 186: | Line 317: | ||
− | ===Kirk Jackson - Xero - Bad Smells That Lead to Bad Security=== | + | ===Kirk Jackson and Andy Prow - Xero and Aura Security - Bad Smells That Lead to Bad Security=== |
---- | ---- | ||
<b>Abstract</b> | <b>Abstract</b> | ||
Line 195: | Line 326: | ||
Kirk is the Security Officer at Xero, and is interested in writing and defending secure web applications. | Kirk is the Security Officer at Xero, and is interested in writing and defending secure web applications. | ||
+ | |||
+ | Andy Prow is an IT Security Consultant, Trainer and software developer who founded Aura back in 2001. With 19 years in the IT industry Andy has developed code for IBM, Vodafone, Telecom and Microsoft. Andy presents around the world at conferences including Microsoft's TechEd. | ||
Line 290: | Line 423: | ||
− | + | <!-- | |
= Call For Presentations = | = Call For Presentations = | ||
==Call For Presentations== | ==Call For Presentations== | ||
Line 338: | Line 471: | ||
Submissions deadline: 1st August 2013 | Submissions deadline: 1st August 2013 | ||
− | + | --> | |
− | |||
= Training = | = Training = | ||
==Training Events== | ==Training Events== | ||
− | We are happy to announce that training will run on Wednesday September 11th 2013, the day before the OWASP Day conference. The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself. Classes will contain up to 20 students, and each seat has power for laptop usage. Both courses will be run by | + | We are happy to announce that training will run on Wednesday September 11th 2013, the day before the OWASP Day conference. Both courses will be running from '''9:00 AM sharp''' to '''5:00PM'''.The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself. Classes will contain up to 20 students, and each seat has power for laptop usage. Both courses will be run by Aura Information Security, and there is both a basic and advanced course available. Feedback from previous training has been very positive - so get in quick! Details are as follows: |
Line 392: | Line 524: | ||
We will also introduce some of the tools and techniques you should use to test the security of your own systems | We will also introduce some of the tools and techniques you should use to test the security of your own systems | ||
This is a hands on workshop where attendees must bring their own laptops. It is required that users are local admins or root on their own machines. | This is a hands on workshop where attendees must bring their own laptops. It is required that users are local admins or root on their own machines. | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
Line 406: | Line 531: | ||
+ | <!-- | ||
= Call For Sponsorships = | = Call For Sponsorships = | ||
Line 462: | Line 588: | ||
Those who are interested in sponsoring OWASP New Zealand 2013 Conference can contact the [mailto:[email protected][email protected] OWASP New Zealand Board].<br> | Those who are interested in sponsoring OWASP New Zealand 2013 Conference can contact the [mailto:[email protected][email protected] OWASP New Zealand Board].<br> | ||
− | + | --> | |
<headertabs/> | <headertabs/> | ||
[[Category:OWASP AppSec Conference]] | [[Category:OWASP AppSec Conference]] |
Latest revision as of 05:57, 8 October 2013
Introduction
We are proud to announce the fifth annual OWASP New Zealand Day conference, to be held at the University of Auckland on Thursday September 12th, 2013. OWASP New Zealand Day is a one-day conference dedicated to application security, with an emphasis on secure development techniques to help Kiwi developers build more secure applications.
Similar to last year:
- We will be offering training on the day before the conference (Wednesday, 11th of September).
- After lunch on the conference day, we will split to two tracks - one focused on deep technical topics, the other on policy, compliance and risk management.
The fifth OWASP New Zealand Day will be happening thanks to the support provided by the University of Auckland School of Business, which will kindly offer the same conference venue of the last four years. Entry to the event will, as in the past, be free.
For any comments, feedback or observations, please don't hesitate to contact us.
Registration
Registration is now closed.
Important dates
- CFP & CFT submission deadline: 1st August 2013
- Conference Registration deadline: 30th August 2013
- Training Registration deadline: 30th August 2013
- Training Day date: 11th September 2013
- Conference Day date: 12th September 2013
For those of you booking flights, ensure you can be at the venue at 8:30am, the conference will end by 5:30pm however we will have post conference drinks at a local drinking establishment for those interested.
Conference Venue
The University of Auckland Business School |
Conference Sponsors
Gold Sponsors:
Silver Sponsors:
Conference Committee
- Nick Freeman - OWASP New Zealand Leader (Auckland)
- Adrian Hayes - OWASP New Zealand Leader (Wellington)
- Lech Janczewski - Associate Professor - University of Auckland School of Business
Please direct all enquiries to [email protected] and [email protected].
Presentations
12th September 2013
08:30 | Registration | |
09:00 |
Welcome to OWASP New Zealand Day 2013 |
|
09:10 |
Securing the Web Without Site-Specific Passwords |
|
09:50 |
What's Our Software Doing With All That User Input |
|
10:30 |
Break for Morning Tea |
|
11:00 |
Bug Chaining (aka, why XSS can be worse than you think) |
|
11:30 |
OWASP Top 10 Mobile Risks - An Introduction By Case Study |
|
12:30 |
Break for Lunch |
|
13:30 |
Improving XPath Injection with Binary Search Optimizations |
Nothing to See Here! |
14:15 |
Bad Smells That Lead to Bad Security |
Evolution of threats and the skills in your security team |
14:45 |
Security Vulnerability Disclosure |
|
15:00 |
Serialization formats aren't toys |
|
15:30 |
Break for Afternoon Tea |
|
16:00 |
Discussion Panel |
|
16:30 |
Wrap Up |
Speakers List
Tom Eastman - Catalyst IT - Serialization Formats Aren't Toys
Abstract
Do you have an API? Do you accept input from users? Do you accept it in XML? What about YAML? Or maybe JSON? How safe are you? How sure are you? It's not in the OWASP Top 10, but you don't have to look far to hear stories of security vulnerabilities involving deserialization user inputs. Why do they keep happening?
In this talk I'll go over what the threat is, how you might be making yourself vulnerable and how to mitigate the problem. I'll cover the features (not bugs, features) of formats like XML, YAML, and JSON that make them surprisingly dangerous, and how to protect your code from them.
Because here's the thing: If you are using, say, a compliant, properly implemented XML parser to parse your XML, you are NOT safe. Possibly quite the opposite.
Speaker Bio
Tom is a senior Python developer and technical lead for Catalyst IT, New Zealand's largest company specialising in open source. Prior to that he worked as a developer and system administrator for the University of Otago Faculty of Medicine and as a Computer Science tutor for same.
Paul Haas - Security-Assessment.com - Improving XPath Injection with Binary Search Optimisations
Abstract
XPath injection is technique similar to SQL injection for attacking XML processors, however many people are unaware of the technique and exploitation vectors. This talk aims to expand awareness of both the risks and remediation path in addition to the introduction of a new technique to significantly improve reconstruction speed of the backend XML document. A brief primer to XPath injection will also be covered within the talk.
Speaker Bio
Paul Haas hails from California where the waves are better but the quakes are not. With over nine years of experience in professional hacking, he is currently working with Security-Assessment.com in Wellington to bring the good word of web hacks to Kiwis everywhere. His sole hobby is driving people into Mario Kart's abyss.
Nick von Dadelszen - Lateral Security - Security Vulnerability Disclosure
Abstract
Disclosing security vulnerabilities can be a dangerous business. While there are systems in place for handling disclosures to most major software companies, the process for disclosing vulnerabilities to local organisations is a lot less discussed.
As the discloser, there is always the chance that you are accused of hacking and get a visit from the police merely for identifying an issue. As an organisation, you can find yourself on the front page of the news when someone goes public with an issue.
This talk outlines the dilemmas faced when stumbling across that SQL injection in the local shopping site and proposes mechanisms to safely get the right people told about it. It also discusses how organisations can make it more likely that security vulnerabilities are reported to them directly, rather than through the press.
Speaker Bio
Nick von Dadelszen is the technical director at Lateral Security. Nick has been performing professional penetration testing for over 12 years and has managed several successful penetration testing teams. He has worked with the majority of large corporates and Government agencies in New Zealand and is a regular presenter at OWASP and Kiwicon conferences.
Mark Piper - Insomnia Security - OWASP Top 10 Mobile Risks - An Introduction By Case Study
Abstract
As mobile application usage explodes, so does the associated application security issues. The OWASP Mobile Security Project includes an initiative to categorise and rate these issues into a top 10 format. This list is known as the Top 10 Mobile Risks.
During the session, we will introduce the current (RC1) Top 10 supported with several real world case studies of issues. We will cover how the issues were identified, how they may be exploited by attackers and what mitigation's could be implemented to resolve the issues in the future. While the issues will be largely platform agnostic, the examples will cover both iOS and Android environments.
Speaker Bio
Mark is a Principal Security Consultant with the Insomnia Security team. Mark spends his days auditing software, running penetration testing and red team engagements while working with global customers on developing new testing services.
Kirk Jackson and Andy Prow - Xero and Aura Security - Bad Smells That Lead to Bad Security
Abstract
Your job as a defender is to reduce the attack surface of your web application and protect your infrastructure and data from being breached. However we can't be involved in every decision that goes on in our organisation, and we don't always think the same as an attacker does. This talk will introduce you to some common "bad smells" that might indicate security issues lurking under the surface of your code, and help you develop your spidey sense so that you know when to raise the alarm.
Speaker Bio
Kirk is the Security Officer at Xero, and is interested in writing and defending secure web applications.
Andy Prow is an IT Security Consultant, Trainer and software developer who founded Aura back in 2001. With 19 years in the IT industry Andy has developed code for IBM, Vodafone, Telecom and Microsoft. Andy presents around the world at conferences including Microsoft's TechEd.
Kim Carter - BinaryMist - What's Our Software Doing With All That User Input
Abstract
What are we doing with all the characters that get shoved into our applications? Have we considered every potential execution context? It's often interesting and surprising to see what sort of concoction of characters can be executed in different places... and linking multiple attack vectors together which the builders haven't thought about. What are we trusting? Why are we trusting it? What, where and how should we be sanitising?
We have a vast collection of libraries, techniques, cheat sheets, tutorials, guides and tools at our disposal. I often find myself thinking... how can we commoditise the sanitisation of user input and I keep coming up with the same answer. It's not easy. Every application has a completely different set of concerns.
In order for our software to be shielded from an attack, the builders must think like attackers.
In this talk I'll attempt to:
- Increase our knowledge and awareness
- Discuss practical techniques and approaches that increase our defences
- Break some software
Speaker Bio
Kim Carter is a Software Engineer, Architect, Entrepreneur and the founder of BinaryMist. He is passionate about and enjoys many things. Some of which include:
- Designing and creating robust software and networks.
- Breaking his and others software and networks, then fixing it/them.
- Teaching, training, mentoring, motivating, listening to and being around smart people.
- Increasing quality awareness and helping people and organisations implement higher quality in a cost effective manner.
- Improving operational efficiencies.
Hugh Davenport - Aura RedEye Security - Bug Chaining (aka, why XSS can be worse than you think)
Abstract
Security bugs can range in damage from small stuff, all the way to big stuff. Some people only focus on the large stuff, and the smaller stuff can go unnoticed. This talk will give a real world example of a project that had a small bug, that allowed a larger bug to happen, which allowed a larger bug, which allowed for unwanted shell access.
Speaker Bio
Hugh works at Aura RedEye Security on their managed vulnerability scanning service. In his spare time, he is the security point of contact on the Mahara open source tool and contributes to many other open source projects.
Hinne Hettema - University of Auckland - Evolution of Threats and the Skills in our Security Team
Abstract
The threat landscape for security threats is constantly evolving, with new threats being stealthier, more diverse, and increasingly aimed at bypassing the protection offered by antivirus and network intrusion detection systems. Adversaries are now often part of a semi-organised underground economy geared towards the acquisition and sale of digital assets such as usernames, passwords, confidential business information, financial data and designs. There are specific value chains in this economy, which make the acquisition, sale and utilisation of such assets a relatively easy process.
This talk focuses on the skills needed in a security team to deal with this next level of threat, and on the sort of teams that we need in enterprise security to address the modern threats that we face.
Speaker Bio
Hinne Hettema is the team leader of the IT security team at The University of Auckland, an honorary research fellow in the Department of Philosophy at The University of Auckland, and lectures in cyber security at Unitec. He has 10 years experience in security consulting and has a PhD in Philosophy (2012) and theoretical chemistry (1993).
Francois Marier - Mozilla - Securing the Web Without Site-Specific Passwords
Abstract
Has anyone else noticed that the OWASP Top 10 is not changing very much? Especially in the realm of authentication-related problems. I don't claim to have the one true solution for this, but one thing is certain: if we change how things are done on the web and relieve developers from having to store passwords, we can make things better.
We need to let web developers outsource their authentication needs to people who can do it well. Does that mean we should force all of our users to join Facebook? Well not really. That might work for some sites, but outsourcing all of our logins to a single for-profit company isn't a solution that works for the whole web.
The open web needs a better solution. One that enable users to choose their identity provider and shop for the most secure one if that's what they're into. This is the promise behind Persona and the BrowserID protocol. Choose your email provider carefully and let's get rid of all of these site-specific passwords that are just sitting there waiting to be leaked and cracked.
Speaker Bio
Francois is a software engineer and security champion on the Mozilla Identity team where he works on decentralising authentication on the web. A long time Debian developer, Francois has been involved in Open Source and web development for a while and has always had a strong interest in security.
Andrew Kelly - Nothing to See Here!
Abstract
This is how it starts: "Seeking an exciting new challenge? Want to be responsible for building and shaping an embryonic information security function? Then you so won't want to miss this golden opportunity!" Andrew will talk about the setting up of an information security function in an organisation from scratch ('Greenfield') - as opposed to trying to bed yourself down into an already-existing organisation ('Brownfield'). He'll talk about the pros and the cons, and the many ups and downs. And hopefully he'll answer some questions like: Is there, if fact, any such thing as a greenfield security opportunity left in the wild? And ... if such mythical beasties do exist ... are they worth signing on for? Andrew will discuss the pitfalls and pratfalls of the journey from initial engagement, through (maybe) acceptance, until (perhaps) security sign-off and (hopefully) go-live. He'll also discuss both the Pit Bulls and prats you're likely to meet along the way. So ... if you want to hear a guy speak who reckons he's forgotten more than he ever thought he knew? Then this is so the talk for you!
Speaker Bio
Andrew is a whole year older than he was when he presented at last year's OWASP Day: So this time around he's bringing a quarter century's worth of IT security experience to OWASP! Now 25 years ago, he was this mainframe security uber-tech - but today Andrew's recognised as being a 'pragmatic' subject-matter expert on corporate-level information security policy, compliance, frameworks and governance. His first greenfield security 'opportunity' came in November 1989 at the Sun Life Assurance Company of Canada, in the UK. And during those intervening 24 years, he's had similar experiences at various other companies including the likes of Lloyds/TSB Bank, Fonterra, BT Syntegra, Telecom/Gen-i and, lately, Health Benefits Ltd. - amongst many others.
Training Events
We are happy to announce that training will run on Wednesday September 11th 2013, the day before the OWASP Day conference. Both courses will be running from 9:00 AM sharp to 5:00PM.The training venues will be auditoriums kindly provided by the University of Auckland, in the same building as the OWASP Day conference itself. Classes will contain up to 20 students, and each seat has power for laptop usage. Both courses will be run by Aura Information Security, and there is both a basic and advanced course available. Feedback from previous training has been very positive - so get in quick! Details are as follows:
Basic Web Application Security
These days websites are under constant attack and it's incredibly easy for a developer or administrator to make seemingly minor mistakes that introduce security vulnerabilities.
You can't fight a war that you don't know you're waging. You can't defend your websites against attack unless you know the tricks the attackers are using to infiltrate. By the end of this workshop you'll have a good understanding of the OWASP Top 10 including:
- Cross-Site Scripting (XSS)
- Cross-Site Request Forgery (CSRF)
- SQL Injection
- Man-In-the-Middle attacks
- Layering your defenses (defense-in-depth) that can help protect you from exploit chaining.
More importantly, however, you'll also learn how to minimise the risk from these and other attacks, with practical tips that you can apply straight away to help you design, build and manage more secure websites. This workshop is essential for:
- All developers and designers working on web applications but without formal training in security
- Anyone working in the website / web application space
- IT Professionals interested in security issues
This is a hands on workshop where attendees must bring their own laptops. It is required that users are local admins or root on their own machines.
Advanced Web Application Security
This advanced web security course is for senior or experienced developers who are looking for a deeper understanding of web security, beyond the OWASP Top 10. By the end of this workshop you'll have a good understanding of:
Advanced Attacks
We will run through more complex attacks against web-apps using layered attacks requiring a multi-step defense including
- Malicious file uploads and web shells
- XXS shells
- Padding oracle attacks
- XXE injection attacks
- Serialisation and file include attacks
- Timing attacks
- Cryptography
Where, when and how to use it effectively and securely.
Advanced Design and Defense
- How to secure systems against malicious users and admins.
- How to secure data at rest such as credit cards, banking data or other high value data.
- Tools
We will also introduce some of the tools and techniques you should use to test the security of your own systems This is a hands on workshop where attendees must bring their own laptops. It is required that users are local admins or root on their own machines.
For further information, please contact us at the follow email addresses: