|
|
(83 intermediate revisions by 5 users not shown) |
Line 1: |
Line 1: |
− | {{Chapter Template|chaptername=Belgium|extra=The chapter leader is [mailto:seba@owasp.org Sebastien Deleersnyder]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-belgium|emailarchives=http://lists.owasp.org/pipermail/owasp-belgium}} | + | {{Chapter Template|chaptername=Belgium|extra=The chapter leaders are [mailto:seba@owasp.org Sebastien Deleersnyder], [mailto:lieven.desmet@owasp.org Lieven Desmet] and [mailto:bart.dewin@owasp.org Bart De Win] |
| + | |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-belgium|emailarchives=http://lists.owasp.org/pipermail/owasp-belgium}} |
| | | |
− | = Local News = | + | = Local News = |
| | | |
− | == Upcoming events == | + | == Upcoming Chapter Meetings == |
| | | |
− | === Upcoming chapter meetings ===
| + | * OWASP BE chapter meeting: registration via https://owasp-belgium-2019-11-25.eventbrite.com/ |
| | | |
− | We will organize our next chapter meetings this year:
| + | See the {{#switchtablink:Chapter Meetings|Chapter Meetings}} tab for more details and older meetings. |
− | * 7 June 2016 (Registration via https://owasp-belgium-2016-06-07.eventbrite.com)
| |
− | * week 26-Sep
| |
− | * week 12-Dec
| |
| | | |
− | See https://www.owasp.org/index.php/Belgium#Chapter_Meetings for more details.
| + | == Stay in Touch == |
− | | |
− | === OWASP BeNeLux Day 2016 === | |
− | | |
− | We are proud to announce the dates of the next edition of BeNeLux OWASP Day! The event will take place on 17 and 18 March 2016, in Belval Campus, in Esch-sur-Alzette - Luxembourg.
| |
− | | |
− | See [[BeNeLux OWASP Day 2016]] for more details.
| |
− | | |
− | == '''Stay in touch''' ==
| |
| | | |
| <center> | | <center> |
Line 33: |
Line 23: |
| If you want to be invited for the next OWASP Belgium Chapter meetings, please [http://eepurl.com/iFZtb drop us your contact info]. | | If you want to be invited for the next OWASP Belgium Chapter meetings, please [http://eepurl.com/iFZtb drop us your contact info]. |
| | | |
− | == Structural Sponsors 2016 == | + | == Structural Sponsors 2019 == |
| | | |
− | OWASP Belgium thanks its structural chapter supporters for 2016 and the OWASP BeNeLux Days 2016: | + | OWASP Belgium thanks its structural chapter supporters for 2019 and the OWASP BeNeLux Days 2018: |
| | | |
− | [http://www.zionsecurity.com https://www.owasp.org/images/e/e6/Zionsecurity.jpg] | + | <!-- Gold --> |
− | [http://www.nviso.be https://www.owasp.org/images/5/5e/Nviso_logo_RGB_baseline_200px.png] | + | [[File:Vest.jpg|250px|link=http://www.vest.nl]] |
− | [http://www.Checkmarx.com https://www.owasp.org/images/a/a2/Checkmarx.jpg]
| + | [[File:DavinsiLabs.png|250px|link=https://www.davinsilabs.com]] |
| + | |
| + | <!-- Silver --> |
| + | [[File:LogoToreon.jpg|250px|link=https://www.toreon.com]] |
| + | [[File:Nviso_logo_RGB_baseline_200px.png|250px|link=http://www.nviso.be]] |
| + | [[File:LogoIngenicoGroup.png|250px|link=https://ingenico.be]] |
| | | |
| If you want to support our chapter, please contact [mailto:seba@owasp.org Seba Deleersnyder] | | If you want to support our chapter, please contact [mailto:seba@owasp.org Seba Deleersnyder] |
| | | |
− | = Chapter Meetings = | + | = Chapter Meetings = |
| | | |
| + | {{:Belgium_Events_2019}} |
| | | |
− | == Upcoming Meeting (7 June 2016) in Zaventem == | + | == Previous Years == |
| | | |
− | === WHEN ===
| + | Events held in |
− | Tuesday 7 June 2016
| + | [[Belgium Events 2018|2018]], |
| + | [[Belgium Events 2017|2017]], |
| + | [[Belgium Events 2016|2016]], |
| + | [[Belgium Events 2015|2015]], |
| + | [[Belgium Events 2014|2014]], |
| + | [[Belgium Events 2013|2013]], |
| + | [[Belgium Events 2012|2012]], |
| + | [[Belgium Events 2011|2011]], |
| + | [[Belgium Events 2010|2010]], |
| + | [[Belgium Events 2009|2009]], |
| + | [[Belgium Events 2008|2008]], |
| + | [[Belgium Events 2007|2007]], |
| + | [[Belgium Events 2006|2006]], |
| + | [[Belgium Events 2005|2005]]. |
| | | |
− | === WHERE ===
| + | = Belgium OWASP Chapter Leaders = |
− | Hosted at [http://www.pwc.be PwC]
| |
− | | |
− | Woluwedal 18<br/>
| |
− | 1932 Zaventem<br/>
| |
− | Belgium<br/>
| |
− | | |
− | Google Maps: https://goo.gl/maps/3Jo8u
| |
− | | |
− | === PROGRAM ===
| |
− | The agenda:
| |
− | *18h15 - 19h00: '''Welcome & sandwiches'''<br>
| |
− | *19h00 - 19h10: '''OWASP Update <br>
| |
− | *19h10 - 20h00: '''CloudPiercer: Bypassing Cloud-based Security Providers''' (by Thomas Vissers)<br>
| |
− | :''Abstract:'' Many website owners turn to Cloud-based Security Providers (CBSPs) to protect their websites from DDoS and web application attacks. Some of these security services rely solely on changing the DNS settings of a customer’s domain name to reroute his traffic through the CBSP's cloud infrastructure. This allows for complete circumvention of the security service by directly attacking the website’s hosting IP address. Therefore, it is crucial that a web server's hosting IP address remains hidden from potential attackers. Despite this risk, our study has shown that, in practice, over 70% of CBSP-protected domains are exposing their real IP address. In this talk, we will discuss several significant attack vectors and steps administrators can take to prevent their IP address from being discovered by attackers.
| |
− | :''Bio:'' '''Thomas Vissers'' Thomas Vissers is a PhD Researcher at iMinds-Distrinet, KU Leuven. His research is broadly focused on internet security and privacy topics, such as cloud-based security, domain name abuse, denial-of-service attacks, email security and browser fingerprinting. Furthermore, he has a special interest in machine learning, data mining and large-scale analyses. Thomas has published and presented his research at various international conferences, such as CCS, NDSS and HotPETS. He obtained his Master’s degree in Engineering from the University of Antwerp and was a research intern at Anna University, India.
| |
− | *20h00 - 20h15: '''Break'''<br>
| |
− | *20h15 - 21h15: <strike>'''A FAIR approach to risk''' (by Wim Remes, Rapid7)<br>
| |
− | :''Abstract:'' IT Risk Management has quickly evolved from something we did once or twice a year to a full time practice within organizations large and small. As more and more data becomes available and with the understanding that taking risk is essential to doing business, we are looking for new approaches to bring the technical and business components of risk together. FAIR (Factor Analysis of Information Risk) is a risk ontology that can help organizations in understanding, communicating, and addressing information risk at all levels. In this presentation we will explore FAIR as a tool for organizations and the value it brings to all players on the risk playing field.
| |
− | :''Bio:'' '''Wim Remes''' As the Manager of Strategic Security Services for Rapid7 in EMEA, Wim Remes leverages his 15+ years of security leadership experience to advise clients on reducing their risk posture by solving complex security problems and by building resiliency into their organization. Wim delivers expert guidance on reducing the high cost of IT security failures, both financially and in terms of brand reputation combining his deep expertise in network security, identity management, policy design, risk assessment, and penetration testing to develop innovative approaches to enterprise security. Before joining the Rapid7 team, Wim was a Managing Consultant at IOActive and previously he has worked as a Manager of Information Security for Ernst and Young and a Security Consultant for Bull, where he gained valuable experience building security programs for enterprise class clients.
| |
− | :Wim has been engaged in various infosec community initiatives such as the co-development of the Penetration Testing Execution Standard (PTES), InfosecMentors, and organizing the BruCON security conference. Wim has been a featured speaker at international conferences such as Excaliburcon (China), Black Hat Europe, Source Boston, Source Barcelona and SecZone (Colombia). He was also a Member of the Board of Directors at (ISC)2 from 2012 until 2014 and Chairperson of that Board in 2014.</strike>
| |
− | | |
− | === REGISTRATION ===
| |
− | Please register via EventBrite: https://owasp-belgium-2016-06-07.eventbrite.com
| |
− | | |
− | === Coverage ===
| |
− | | |
− | == Previous Meeting (23 May 2016) in Mechelen ==
| |
− | | |
− | === WHEN ===
| |
− | Monday 23 May 2016
| |
− | | |
− | === WHERE ===
| |
− | Hosted at Moonbeat (Mechelen), kindly offered by [http://www.is4u.be/ is4u].
| |
− | | |
− | Venue address:<br>
| |
− | Moonbeat <br>
| |
− | Oude Brusselsestraat 10-12 <br>
| |
− | 2800 mechelen <br>
| |
− | | |
− | Route/Parking: http://www.moonbeat.be/contact .
| |
− | | |
− | === PROGRAM ===
| |
− | The agenda:
| |
− | *18h00 - 19h00: '''Welcome & sandwiches'''<br>
| |
− | *19h00 - 19h10: '''OWASP Update <br>
| |
− | *19h10 - 20h00: '''All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS''' (by Mathy Vanhoef, iMinds-DistriNet-KU Leuven)<br>
| |
− | :''Abstract:'' We present new biases in RC4, break the Wi-Fi Protected Access Temporal Key Integrity Protocol (WPA-TKIP), and design a practical plaintext recovery attack against the Transport Layer Security (TLS) protocol. To empirically find new biases in the RC4 keystream we use statistical hypothesis tests. This reveals many new biases in the initial keystream bytes, as well as several new long-term biases. Our fixed-plaintext recovery algorithms are capable of using multiple types of biases, and return a list of plaintext candidates in decreasing likelihood.
| |
− | :To break WPA-TKIP we introduce a method to generate a large number of identical packets. This packet is decrypted by generating its plaintext candidate list, and using redundant packet structure to prune bad candidates. From the decrypted packet we derive the TKIP MIC key, which can be used to inject and decrypt packets. In practice the attack can be executed within an hour. We also attack TLS as used by HTTPS, where we show how to decrypt a secure cookie with a high success rate using roughly one billion ciphertexts. This is done by injecting known data around the cookie, abusing this using Mantin's ABSAB bias, and brute-forcing the cookie by traversing the plaintext candidates. Using our traffic generation technique, we are able to execute the attack in merely 75 hours.
| |
− | :''Bio:'' '''Mathy Vanhoef''' is a PhD student at KU Leuven, where he performs research on RC4 and its usage in network protocols such as WPA-TKIP and SSL/TLS (e.g. he discovered the RC4 NOMORE attack). He also focuses on wireless security, where he studies MAC address randomization, analyzes protocols like WPA-TKIP, and implements low-layer Wi-Fi attacks using commodity hardware. Apart from research, he is also interested in low-level security, reverse engineering, and binary exploitation. He regularly participates in CTFs with KU Leuven's Hacknamstyle CTF team.
| |
− | *20h00 - 20h10: '''Break'''<br>
| |
− | *20h10 - 21h00: '''Docker Security''' (by Nils De Moor, CTO at WooRank)<br>
| |
− | :''Abstract:'' Docker, the new kid on the block, has taken the Ops world by storm. Suddenly everybody wants applications to be containerized and kick them from a development machine up to a production stack in seconds. But this new paradigm obviously has consequences in terms of security and compliance. In this talk we'll look at how to construct a container around applications and dive deeper into how we can put a tight lock around it, thanks to the built-in security primitives.
| |
− | :''Bio:'' '''Nils De Moor''' is co-founder and CTO at WooRank, a SaaS tool for digital marketing agencies to monitor online presence of a brand. By grabbing and calculating millions of data points every day, he developed a passion for automating, scaling and distributing applications. Besides that he is passionate about open source communities and has started some initiatives, like techbelgium.io, Docker and AWS meetup groups, etc.
| |
− | *21h00 - ... : Networking drink
| |
− | | |
− | === REGISTRATION ===
| |
− | Please register via EventBrite: https://owasp-belgium-2016-05-23.eventbrite.com
| |
− | | |
− | === Coverage ===
| |
− | | |
− | == Previous Meeting (8 March 2016) in Leuven ==
| |
− | | |
− | === WHEN ===
| |
− | Tuesday 8 March 2016
| |
− | | |
− | === WHERE ===
| |
− | Hosted by [https://distrinet.cs.kuleuven.be iMinds-Distrinet Research Group (KU Leuven)].
| |
− | | |
− | Both speakers are faculty of the [http://www.secappdev.org/ Secure Application Development] course which is held in Leuven from 7-11 March 2016. OWASP Members get a 10% discount to attend the course.
| |
− | | |
− | Address: <br>
| |
− | Department of Computer Science (foyer at ground floor)<br> Celestijnenlaan 200 A<br> 3001 Heverlee ([http://googlemapsinterface.kuleuven.be/index.cgi?lang=N&nbol=(50.864186697481145,%204.678754210472107)&zoomlevel=17&plaatsnaam=Department+of+Computer+Science&maptype=roadmap google maps])
| |
− | | |
− | Routemap: https://distrinet.cs.kuleuven.be/about/route/
| |
− | | |
− | === PROGRAM ===
| |
− | The agenda:
| |
− | *18h15 - 19h00: '''Welcome & sandwiches'''<br>
| |
− | *19h00 - 19h15: '''OWASP Update ([https://www.owasp.org/images/4/4e/Owasp_Belgium_update_2016-03-08_v1.pptx PDF])''' <br>
| |
− | *19h15 - 20h15: '''[https://www.owasp.org/images/5/5f/JS_RobustModern_VanCutsem_OWASP2016.pdf Writing robust client-side code using Modern JavaScript]''' (by Tom Van Cutsem, Bell Labs, Nokia)<br>
| |
− | :''Abstract:'' In this talk, I will take the audience on a tour of recent evolutions in the JavaScript language (and surrounding ecosystem) and how they can use these changes to their advantage to write better client-side code that is more robust against bugs and other exploits. JavaScript — still unquestionably the dominant client-side language in use on the Web — has evolved significantly over the past five years, with two significant updates to ECMAScript, its defining standard. I will give a brief introduction to the language and its Good and Bad parts and then move on to features added in ECMAScript 5th edition, such as "strict mode", which are by now widely deployed in major browsers. Next, I will look at relevant language features that were introduced recently as part of ECMAScript 6th edition. Finally, I will give a brief introduction to Secure ECMAScript (SES), which is a secure JavaScript dialect that enables the safe embedding of third-party scripts in a webpage, also forming the basis for Google’s Caja compiler.
| |
− | :''Bio:'' '''Tom Van Cutsem''' is a senior researcher at Nokia Bell Labs in Antwerp, Belgium. Prior to joining Bell Labs, he was a professor of computer science at Vrije Universiteit Brussel. He sat on the ECMA TC39 committee in charge of standardising JavaScript and actively contributed to the ECMAScript 2015 (a.k.a. “ES6”) standard. Together with Mark S. Miller, he designed and specified ECMAScript’s new reflection API. Tom's broader research interests lie in distributed systems, programming languages, stream processing, concurrency and parallelism. He received his PhD in 2008 from Vrije Universiteit Brussel for his research on AmbientTalk, a distributed scripting language for mobile phones.
| |
− | *20h15 - 20h30: '''Break'''<br>
| |
− | *20h30 - 21h30: '''[https://www.owasp.org/images/a/a6/Dan-Wallach-internet-censorship.pdf Internet Censorship: Studies from China and Turkey]''' (by prof. Dan Wallach, Rice University)<br>
| |
− | :''Abstract:'' TBA
| |
− | :''Bio:'' '''Dan Wallach''' is a professor in the systems group at Rice University's Department of Computer Science, He manages Rice's [http://seclab.cs.rice.edu/ computer security lab]. His research interests include mobile code, wireless and smartphone security, and the security of electronic voting systems.
| |
− | | |
− | === REGISTRATION ===
| |
− | Please register via EventBrite: https://owasp-belgium-2016-03-08.eventbrite.com
| |
− | | |
− | === Coverage ===
| |
− | | |
− | | |
− | | |
− | | |
− | == Past Events ==
| |
− | *Events held in [[Belgium Previous Events 2015|2015]]
| |
− | *Events held in [[Belgium Previous Events 2014|2014]]
| |
− | *Events held in [[Belgium Previous Events 2013|2013]]
| |
− | *Events held in [[Belgium Previous Events 2012|2012]]
| |
− | *Events held in [[Belgium Previous Events 2011|2011]]
| |
− | *Events held in [[Belgium Previous Events 2010|2010]]
| |
− | *Events held in [[Belgium Previous Events 2009|2009]]
| |
− | *Events held in [[Belgium Previous Events 2008|2008]]
| |
− | *Events held in [[Belgium Previous Events 2007|2007]]
| |
− | *Events held in [[Belgium Previous Events 2006|2006]]
| |
− | *Events held in [[Belgium Previous Events 2005|2005]]
| |
− | | |
− | = Belgium OWASP Chapter Leaders = | |
| | | |
| The Belgium Chapter is supported by the following board: | | The Belgium Chapter is supported by the following board: |
| | | |
| + | Chapter Leaders |
| *Sebastien Deleersnyder, Toreon | | *Sebastien Deleersnyder, Toreon |
− | *Erwin Geirnaert, Zion Security
| |
− | *Philippe Bogaerts, AviNetworks
| |
− | *André Mariën, Euroclear
| |
| *Lieven Desmet, KU Leuven | | *Lieven Desmet, KU Leuven |
| *Bart De Win, PWC | | *Bart De Win, PWC |
| + | |
| + | Board Members |
| + | *Erwin Geirnaert, Zion Security |
| *David Mathy, Freelance | | *David Mathy, Freelance |
| + | *Adolfo Solero, Freelance |
| + | *Stella Dineva, Ingenico Payment Services |
| + | *Thomas Herlea, NVISO |
| | | |
− | Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects. __NOTOC__ <headertabs/> | + | Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects. |
| + | __NOTOC__ <headertabs></headertabs> |
| [[Category:Europe]] | | [[Category:Europe]] |