This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP BeNeLux-Day 2017"
From OWASP
(→Confirmed speakers Conference) |
m (Fixed misspelled Matias' name in text and links.) |
||
(38 intermediate revisions by 5 users not shown) | |||
Line 7: | Line 7: | ||
= Information = | = Information = | ||
== Keynote speaker == | == Keynote speaker == | ||
− | {{#switchtablink: | + | {{#switchtablink:Conferenceday|<p> |
− | * Jacoba Sieders | + | * Jacoba Sieders |
}} | }} | ||
== Confirmed speakers Conference == | == Confirmed speakers Conference == | ||
− | {{# | + | {{#switchtablink:Conferenceday|<p> |
* Achim D. Brucker | * Achim D. Brucker | ||
* Lieven Desmet | * Lieven Desmet | ||
Line 30: | Line 30: | ||
== OWASP BeNeLux conference is free, but registration is required! == | == OWASP BeNeLux conference is free, but registration is required! == | ||
− | |||
[[image:Register_now_red.png|link=https://owasp-benelux-day-2017.eventbrite.com |alt=Register for the OWASP BeNeLux Day 2017 | Register for the OWASP BeNeLux Day 2017 ]] | [[image:Register_now_red.png|link=https://owasp-benelux-day-2017.eventbrite.com |alt=Register for the OWASP BeNeLux Day 2017 | Register for the OWASP BeNeLux Day 2017 ]] | ||
− | |||
== The OWASP BeNeLux Program Committee == | == The OWASP BeNeLux Program Committee == | ||
Line 52: | Line 50: | ||
== OWASP BeNeLux conference is free, but registration is required! == | == OWASP BeNeLux conference is free, but registration is required! == | ||
− | |||
[[image:Register_now_red.png|link=https://owasp-benelux-day-2017.eventbrite.com |alt=Register for the OWASP BeNeLux Day 2017 | Register for the OWASP BeNeLux Day 2017 ]] | [[image:Register_now_red.png|link=https://owasp-benelux-day-2017.eventbrite.com |alt=Register for the OWASP BeNeLux Day 2017 | Register for the OWASP BeNeLux Day 2017 ]] | ||
− | + | ||
== OWASP BeNeLux training is reserved for OWASP members, and registration is required! == | == OWASP BeNeLux training is reserved for OWASP members, and registration is required! == | ||
− | To support the OWASP organisation, we ask training attendees to | + | To support the OWASP organisation, we ask training attendees to consider becoming an OWASP member, it's only US$50! |
− | |||
Check out the [[Membership]] page to find out more. | Check out the [[Membership]] page to find out more. | ||
Line 79: | Line 75: | ||
The venue is located: | The venue is located: | ||
− | '''Interpolis''' | + | :'''Interpolis''' |
+ | :Spoorlaan 298 | ||
+ | :5017JZ Tilburg | ||
+ | :Netherlands | ||
+ | :[https://goo.gl/maps/5CJYYSMAJD92 Google map] | ||
− | + | '''''Parkeren kan in de gemeentelijke parkeergarage Tivoli, gelegen tussen de Rabobank en het Interpoliskantoor.''''' | |
− | + | === How to reach the venue? === | |
+ | ;'''Openbaar vervoer '''<br> | ||
+ | Het Centraal Station en bushalte liggen aan de Spoorlaan op ± 10 minuten loopafstand van het Achmeakantoor. | ||
− | + | '''<u>Eigen vervoer</u>''' | |
− | + | ;'''Routebeschrijving vanuit Den Bosch''' | |
− | + | :Op A58 bij afslag 10 (Tilburg/ Hilvarenbeek) rechts af richting centrum (Ringbaan Oost). Na ongeveer 1 km, voor het spoorwegviaduct, links af richting centrum / Centraal Station (Spoorlaan). Na ongeveer 700 meter staat links het Interpoliskantoor. | |
+ | |||
+ | ;'''Routebeschrijving vanuit Waalwijk''' | ||
+ | :A261 richting Tilburg. Bij binnenkomst Tilburg rechtdoor, viaduct over. Bij de rotonde rechtdoor, 2e afslag (Ringbaan West) volgen. Na ongeveer 1km, ter hoogte van woontoren Westpoint, links af (Hart van Brabantlaan). Weg volgen, gaat over in Spoorlaan. Na ongeveer 2 km staat rechts het Interpoliskantoor. | ||
+ | |||
+ | ;'''Routebeschrijving vanuit Dongen''' | ||
+ | :Vanuit Dongen de Burgemeester Letschertweg volgen tot de N261 Waalwijk/Tilburg. Neem de afslag Tilburg. Bij binnenkomst Tilburg rechtdoor, viaduct over. Bij de rotonde rechtdoor, 2e afslag (Ringbaan West) volgen. Na ongeveer 1km, ter hoogte van woontoren Westpoint, links af (Hart van Brabantlaan). Weg volgen, gaat over in Spoorlaan. Na ongeveer 2 km staat rechts het Interpoliskantoor. | ||
+ | |||
+ | ;'''Routebeschrijving vanuit Utrecht/Breda (A27 richting Tilburg)''' | ||
+ | :Vanaf A58 afslag 11 (Tilburg West) rechts af richting centrum (Ringbaan West). Weg volgen. Na ongeveer 1,5 km, ter hoogte van woontoren Westpoint, rechts af (Hart van Brabantlaan). Weg volgen, gaat over in Spoorlaan. Na ongeveer 2 km staat rechts het Interpoliskantoor. | ||
=== Hotel nearby === | === Hotel nearby === | ||
− | + | [https://www.google.nl/maps/search/Hotels/@51.5571525,5.0821866,15z/data=!3m1!4b1 Hotels on Google Maps] | |
<!-- Fourth tab --> | <!-- Fourth tab --> | ||
Line 107: | Line 118: | ||
| 09h30 - 11h00 || Training | | 09h30 - 11h00 || Training | ||
| rowspan="7" style="width:100px;" | [[OWASP_BeNeLux-Day_2017#WebGoat_-_Teaching_application_security_101_by_Nanne_Baars | WebGoat - Teaching application security 101]] <br>by [[OWASP_BeNeLux-Day_2017#WebGoat_-_Teaching_application_security_101_by_Nanne_Baars | Nanne Baars]] | | rowspan="7" style="width:100px;" | [[OWASP_BeNeLux-Day_2017#WebGoat_-_Teaching_application_security_101_by_Nanne_Baars | WebGoat - Teaching application security 101]] <br>by [[OWASP_BeNeLux-Day_2017#WebGoat_-_Teaching_application_security_101_by_Nanne_Baars | Nanne Baars]] | ||
− | | rowspan="7" style="width:100px;" | Sebastien Deleersnyder | + | | rowspan="7" style="width:100px;" | [[OWASP_BeNeLux-Day_2017#Whiteboard_Hacking_aka_Hands-on_Threat Modeling_by_Sebastien Deleersnyder | Whiteboard Hacking aka Hands-on Threat Modeling]] <br>by [[OWASP_BeNeLux-Day_2017#Whiteboard_Hacking_aka_Hands-on_Threat Modeling_by_Sebastien Deleersnyder | Sebastien Deleersnyder]] |
− | | rowspan="7" style="width:100px;" | Bart De Win | + | | rowspan="7" style="width:100px;" | [[OWASP_BeNeLux-Day_2017#Secure_Development:_Models_and_best_practices_by_Bart_De_Win | Secure Development: Models and best practices]] <br>by [[OWASP_BeNeLux-Day_2017#Secure_Development:_Models_and_best_practices_by_Bart_De_Win | Bart De Win]] |
|- | |- | ||
| 11h00 - 11h30 || ''Coffee Break'' | | 11h00 - 11h30 || ''Coffee Break'' | ||
Line 141: | Line 152: | ||
Tired of all the lessons? During the training we will host a small CTF competition which you can take a shot at and compete with each other... | Tired of all the lessons? During the training we will host a small CTF competition which you can take a shot at and compete with each other... | ||
+ | |||
+ | === Requirements=== | ||
+ | Please find the course prerequisites here: https://github.com/nbaars/owasp-training | ||
====Bio==== | ====Bio==== | ||
Nanne Baars works as a security consultant & developer at JDriven and is one of the primary developers of WebGoat. | Nanne Baars works as a security consultant & developer at JDriven and is one of the primary developers of WebGoat. | ||
+ | |||
+ | === Whiteboard Hacking aka Hands-on Threat Modeling by Sebastien Deleersnyder === | ||
+ | ====Topic(s) ==== | ||
+ | * Threat modeling introduction | ||
+ | * Diagrams – what are you building? | ||
+ | * Identifying threats – what can go wrong? | ||
+ | * Hands-on: STRIDE analysis of an Internet of Things (IoT) deployment with an on premise gateway and secure update service | ||
+ | * Addressing each threats | ||
+ | * Hands-on: threat mitigations OAuth scenarios for web and mobile applications | ||
+ | |||
+ | ====Keywords ==== | ||
+ | Threat Modeling, STRIDE, Technical risk assessment | ||
+ | |||
+ | ====Abstract ==== | ||
+ | This is a one day version of our Black Hat training on Threat Modeling. The students will be challenged to perform practical threat modeling in groups of 3 to 4 people covering the different stages of threat modeling on: | ||
+ | * An Internet of Things (IoT) deployment with an on premise gateway and secure update service | ||
+ | * An HR services OAuth scenario for mobile and web applications | ||
+ | Threat modeling is a structured activity for identifying and evaluating application threats and vulnerabilities. It also allows consideration of security issues at the component or application level. The threat modeling course will teach you to perform threat modeling through a series of workshops, where our trainer will guide you through the different stages of a practical threat model. <br> | ||
+ | This course is aimed at software developers, architects, system managers or security professionals. Before attending this course, students should be familiar with basic knowledge of web and mobile Applications, databases & Single sign on (SSO) principles. | ||
+ | |||
+ | |||
+ | ====Bio==== | ||
+ | Sebastien (lead application security consultant Toreon) led engagements in the domain of ICT-security, Web and Mobile Security with several customers in the private and public sector. Sebastien is the Belgian OWASP Chapter Leader and is co-project leader of OWASP SAMM. | ||
+ | |||
+ | === Secure Development: Models and best practices by Bart De Win === | ||
+ | ====Topic(s) ==== | ||
+ | * Software Assurance maturity models | ||
+ | * Secure Development in agile development | ||
+ | * Tips and tricks for practical SDLC | ||
+ | * Hands-on: SAMM analysis of your enterprise using SAMM 1.5 | ||
+ | * Sneak preview of SAMM 2.0 | ||
+ | |||
+ | ====Keywords ==== | ||
+ | SDLC, SAMM, Agile development, | ||
+ | |||
+ | ====Abstract ==== | ||
+ | It takes much more than a good developer to build secure software within an organisation. Indeed, building secure software is about ensuring that security is taken into consideration during the entire software lifecycle. It is about ensuring that security best practices are being employed efficiently, and that uncovered risks are appropriately dealt with in due time. | ||
+ | |||
+ | During this one-day training, we will introduce and discuss different secure development approaches and models. We will look into waterfall vs. agile development and discuss different strategies to successfully run an SDLC program. Finally, we will also put theorie into practice and take your organisation to perform a mini SDLC assessment and improvement exercise. | ||
+ | [[File:Benelux2017 - Secure Development Training deck.pdf|thumb]] | ||
+ | The slides of this session are available for download in the media file. | ||
+ | |||
+ | ====Bio==== | ||
+ | Bart is an application security consultant and enthousiast and is spending considerable time on secure development projects. Bart is board member of the Belgian OWASP Chapter and is co-project leader of OWASP SAMM. | ||
Line 157: | Line 215: | ||
! width="190pt" | Speaker | ! width="190pt" | Speaker | ||
! width="400pt" | Topic | ! width="400pt" | Topic | ||
− | + | ! width="100pt" -- ! | Media | |
|- | |- | ||
| 08h30 - 09h00 | | 08h30 - 09h00 | ||
Line 167: | Line 225: | ||
| 09h15 - 10h00 || [[OWASP_BeNeLux-Day_2017#Attribute Based Access Control. Why, what, how? by Jacoba Sieders | Jacoba Sieders]] | | 09h15 - 10h00 || [[OWASP_BeNeLux-Day_2017#Attribute Based Access Control. Why, what, how? by Jacoba Sieders | Jacoba Sieders]] | ||
|| [[OWASP_BeNeLux-Day_2017#Attribute Based Access Control. Why, what, how? by Jacoba Sieders | Attribute Based Access Control. Why, what, how?]] | || [[OWASP_BeNeLux-Day_2017#Attribute Based Access Control. Why, what, how? by Jacoba Sieders | Attribute Based Access Control. Why, what, how?]] | ||
− | + | || [[Media:OWASP BeNeLux-Day 2017 AttributeBasedAccessControl WhyWhatHow JacobaSieders.pdf|Slides]]<br>[https://youtu.be/O7iWITnZGsk Video] | |
|- | |- | ||
− | | 10h00 - 10h45 || [[OWASP_BeNeLux-Day_2017#How to spend $3.6mil on one coding mistake, and other fun stuff you can do with $3.6mil by | + | | 10h00 - 10h45 || [[OWASP_BeNeLux-Day_2017#How to spend $3.6mil on one coding mistake, and other fun stuff you can do with $3.6mil by Matias Madou | Matias Madou]] |
− | || [[OWASP_BeNeLux-Day_2017#How to spend $3.6mil on one coding mistake, and other fun stuff you can do with $3.6mil by | + | || [[OWASP_BeNeLux-Day_2017#How to spend $3.6mil on one coding mistake, and other fun stuff you can do with $3.6mil by Matias Madou | How to spend $3.6mil on one coding mistake, and other fun stuff you can do with $3.6mil]] |
− | + | || [[Media:OWASP_BeNeLux-Day_2017_how_to_spend_$3.6_mil_on_one_coding_mistake_by_Matias_Madou.pdf|Slides]] <br> [https://www.youtube.com/watch?v=dt5rFGBztJA&feature=youtu.be Video] | |
+ | |||
|- | |- | ||
| 10h45 - 11h15 | | 10h45 - 11h15 | ||
Line 178: | Line 237: | ||
| 11h15 - 12h00 || [[OWASP_BeNeLux-Day_2017#The evil friend in your browser by Achim D. Brucker | Achim D. Brucker]] | | 11h15 - 12h00 || [[OWASP_BeNeLux-Day_2017#The evil friend in your browser by Achim D. Brucker | Achim D. Brucker]] | ||
|| [[OWASP_BeNeLux-Day_2017#The evil friend in your browser by Achim D. Brucker | The evil friend in your browser]] | || [[OWASP_BeNeLux-Day_2017#The evil friend in your browser by Achim D. Brucker | The evil friend in your browser]] | ||
− | + | | [[Media:OWASP_BeNeLux-Day_2017_The evil friend in your browser_Achim_Brucker.pdf|Slides]]<br>[https://www.youtube.com/watch?v=_Uj-Ci37Rvw&feature=youtu.be Video] | |
|- | |- | ||
| 12h00 - 12h45 || [[OWASP_BeNeLux-Day_2017#Exploring the ecosystem of malicious domain registrations in the .eu TLD by Lieven Desmet | Lieven Desmet]] | | 12h00 - 12h45 || [[OWASP_BeNeLux-Day_2017#Exploring the ecosystem of malicious domain registrations in the .eu TLD by Lieven Desmet | Lieven Desmet]] | ||
|| [[OWASP_BeNeLux-Day_2017#Exploring the ecosystem of malicious domain registrations in the .eu TLD by Lieven Desmet | Exploring the ecosystem of malicious domain registrations in the .eu TLD]] | || [[OWASP_BeNeLux-Day_2017#Exploring the ecosystem of malicious domain registrations in the .eu TLD by Lieven Desmet | Exploring the ecosystem of malicious domain registrations in the .eu TLD]] | ||
− | + | | [[Media:OWASP BeNeLux-Day 2017 Exploring the ecosystem of malicious domain registrations LievenDesmet.pdf|Slides]]<br>[https://www.youtube.com/watch?v=09SNSYHw8H0&feature=youtu.be Video] | |
|- | |- | ||
| 12h45 - 13h45 | | 12h45 - 13h45 | ||
Line 189: | Line 248: | ||
| 13h45 - 14h30 || [[OWASP_BeNeLux-Day_2017#Don't trust the DOM: Bypassing XSS mitigations via script gadgets by Sebastian Lekies | Sebastian Lekies]] | | 13h45 - 14h30 || [[OWASP_BeNeLux-Day_2017#Don't trust the DOM: Bypassing XSS mitigations via script gadgets by Sebastian Lekies | Sebastian Lekies]] | ||
|| [[OWASP_BeNeLux-Day_2017#Don't trust the DOM: Bypassing XSS mitigations via script gadgets by Sebastian Lekies | Don't trust the DOM: Bypassing XSS mitigations via script gadgets]] | || [[OWASP_BeNeLux-Day_2017#Don't trust the DOM: Bypassing XSS mitigations via script gadgets by Sebastian Lekies | Don't trust the DOM: Bypassing XSS mitigations via script gadgets]] | ||
− | + | | [[Media:OWASP BeNeLux-Day 2017 Bypassing XSS mitigations via script gadgets Sebastian Lekies.pdf|Slides]]<br>[https://www.youtube.com/watch?v=rssg--FP1AE&feature=youtu.be Video] | |
|- | |- | ||
| 14h30 - 15h15 || [[OWASP_BeNeLux-Day_2017#A Series of Unfortunate Events: Where Malware Meets Murphy by Mattijs van Ommeren | Mattijs van Ommeren]] | | 14h30 - 15h15 || [[OWASP_BeNeLux-Day_2017#A Series of Unfortunate Events: Where Malware Meets Murphy by Mattijs van Ommeren | Mattijs van Ommeren]] | ||
|| [[OWASP_BeNeLux-Day_2017#A Series of Unfortunate Events: Where Malware Meets Murphy by Mattijs van Ommeren | A Series of Unfortunate Events: Where Malware Meets Murphy]] | || [[OWASP_BeNeLux-Day_2017#A Series of Unfortunate Events: Where Malware Meets Murphy by Mattijs van Ommeren | A Series of Unfortunate Events: Where Malware Meets Murphy]] | ||
− | <!-- | | + | | <!--[[Media:OWASP_Benelux-Day_2017_A_Series_Of_Unfortunate_Events-Where_Malware_Meets_Murphy_Mattijs_van_Ommeren.pdf|Slides]]<br> -->[https://www.youtube.com/watch?v=d67yxt3FdTA&feature=youtu.be Video] |
|- | |- | ||
| 15h15 - 15h45 | | 15h15 - 15h45 | ||
Line 200: | Line 259: | ||
| 15h45 - 16h30 || [[OWASP_BeNeLux-Day_2017#Common REST API security pitfalls by Philippe De Ryck | Philippe De Ryck]] | | 15h45 - 16h30 || [[OWASP_BeNeLux-Day_2017#Common REST API security pitfalls by Philippe De Ryck | Philippe De Ryck]] | ||
|| [[OWASP_BeNeLux-Day_2017#Common REST API security pitfalls by Philippe De Ryck | Common REST API security pitfalls]] | || [[OWASP_BeNeLux-Day_2017#Common REST API security pitfalls by Philippe De Ryck | Common REST API security pitfalls]] | ||
− | + | | [[Media:OWASP BeNeLux-Day 2017 Common REST API security pitfalls Philippe De Ryck.pdf|Slides]]<br>[https://www.youtube.com/watch?v=Meh4EUmLCfM&feature=youtu.be Video] | |
|- | |- | ||
| 16h30 - 17h15 || [[OWASP_BeNeLux-Day_2017#Creating An AppSec Pipeline With Containers In A Week How We Failed And Succeeded by Jeroen Willemsen | Jeroen Willemsen]] | | 16h30 - 17h15 || [[OWASP_BeNeLux-Day_2017#Creating An AppSec Pipeline With Containers In A Week How We Failed And Succeeded by Jeroen Willemsen | Jeroen Willemsen]] | ||
|| [[OWASP_BeNeLux-Day_2017#Creating An AppSec Pipeline With Containers In A Week How We Failed And Succeeded by Jeroen Willemsen | Creating An AppSec Pipeline With Containers In A Week How We Failed And Succeeded]] | || [[OWASP_BeNeLux-Day_2017#Creating An AppSec Pipeline With Containers In A Week How We Failed And Succeeded by Jeroen Willemsen | Creating An AppSec Pipeline With Containers In A Week How We Failed And Succeeded]] | ||
− | + | | [[Media:OWASP BeNeLux-Day 2017 Creating An AppSec Pipeline With Containers In A Week How We Failed And Succeeded Jeroen Willemsen.pdf|Slides]]<br>[https://www.youtube.com/watch?v=Q3q1mdev5rs&feature=youtu.be Video] | |
|- | |- | ||
| 17h15 - 17h30 | | 17h15 - 17h30 | ||
Line 224: | Line 283: | ||
− | ===How to spend $3.6mil on one coding mistake, and other fun stuff you can do with $3.6mil by | + | ===How to spend $3.6mil on one coding mistake, and other fun stuff you can do with $3.6mil by Matias Madou=== |
====Abstract==== | ====Abstract==== | ||
In a recent global study, the average cost of a data breach is $3.62M globally. This session will discuss infamous examples of data breaches that has made headlines around the world. We will explore the technical details of the vulnerability itself and what a coding solution may have been to prevent the breach. We will also dive deeper on exploring different solutions, processes and techniques you can apply in your day-to-day to prevent application security vulnerabilities in your code. | In a recent global study, the average cost of a data breach is $3.62M globally. This session will discuss infamous examples of data breaches that has made headlines around the world. We will explore the technical details of the vulnerability itself and what a coding solution may have been to prevent the breach. We will also dive deeper on exploring different solutions, processes and techniques you can apply in your day-to-day to prevent application security vulnerabilities in your code. | ||
Line 233: | Line 292: | ||
===The evil friend in your browser by Achim D. Brucker=== | ===The evil friend in your browser by Achim D. Brucker=== | ||
====Abstract==== | ====Abstract==== | ||
− | + | On the one hand, browser extensions, e.g., for Chrome, are very useful, as they extend web browsers with additional functionality | |
+ | (e.g., blocking ads). On the other hand, they are the most dangerous code that runs in your browsers: extension can read and modify both the content displayed in the browser. As they also can communicate with any web-site or web-service, they can report both data and metadata to external parties. | ||
+ | |||
+ | The current security model for browser extensions seems to be inadequate for expressing the security or privacy needs of browser users. Consequently, browser extensions are a "juice target" for attackers targeting web users. | ||
+ | |||
+ | We present results of analysing over 60000 browser extensions on how they use the current security model and discuss examples of extensions that are potentially of high risk. Based on the results of our analysis of real world browser extensions as well as our own threat model, we discuss the limitations of the current security model form a user perspective. need of browser users. | ||
+ | |||
====Bio==== | ====Bio==== | ||
− | + | Dr. Achim D. Brucker (www.brucker.uk) is a Senior Lecturer and consultant for software and systems assurance at the Computer Science Department of The University of Sheffield, UK. Until December 2015, he was a Research Expert (Architect), Security Testing Strategist, and Project Lead in the Global Security Team of SAP SE, where he defined the risk-based security testing strategy of SAP that combines static, dynamic, and interactive security testing methods and integrates them deeply into SAP's Secure Software Development Lifecycle. He has experience in rolling out *AST tools to world-wide development organisations. | |
− | |||
===Exploring the ecosystem of malicious domain registrations in the .eu TLD by Lieven Desmet=== | ===Exploring the ecosystem of malicious domain registrations in the .eu TLD by Lieven Desmet=== | ||
====Abstract==== | ====Abstract==== | ||
− | + | In this talk, we report on an extensive analysis of 14 months of domain registration in the .eu TLD. The purpose is to identify large-scale malicious campaigns. Overall, the dataset of this study contains 824,121 new domain registrations; 2.53% of which have been flagged as malicious by blacklisting services. We explore the ecosystem and modus operandi of elaborate cybercriminal entities that recurrently register large amounts of domains for one-shot, malicious use. Although these malicious domains are short-lived, we establish that at least 80.04% of them can be framed in to 20 larger campaigns with varying duration and intensity. We further report on insights in the operational aspects of this business and observe, amongst other findings, that their processes are only partially automated. | |
====Bio==== | ====Bio==== | ||
− | + | Lieven Desmet is a Senior Research Manager on Secure Software in the imec-DistriNet Research Group at the Katholieke Universiteit Leuven (Belgium), where he outlines and implements the research strategy, coaches junior researchers in application security, and participates in dissemination, valorisation and spin-off activities. Lieven is also involved in OWASP as a board member of the Belgium OWASP Chapter, and part of the organisation team of the OWASP BeNeLux Day. | |
− | |||
===Don't trust the DOM: Bypassing XSS mitigations via script gadgets by Sebastian Lekies=== | ===Don't trust the DOM: Bypassing XSS mitigations via script gadgets by Sebastian Lekies=== | ||
Line 288: | Line 351: | ||
== Social Event,starting at 7PM == | == Social Event,starting at 7PM == | ||
− | + | Thursday, November 23rd | |
+ | ;Dudok Tilburg | ||
+ | :Veemarktstraat 33 | ||
+ | :5038 CT Tilburg | ||
+ | :http://www.dudok.nl/ | ||
+ | Menu: | ||
+ | :As we are a big group, Dudok will prepare the following [[Media:Dudok menu OWASP.pdf|menu]] for us! | ||
+ | '''If you want to join the social event, don't forget to register for the social event via the registration:''' | ||
+ | :[[image:Register_now_red.png|link=https://owasp-benelux-day-2017.eventbrite.com |200px|alt=Register for the OWASP BeNeLux Day 2017 | Register for the OWASP BeNeLux Day 2017 ]] | ||
+ | |||
+ | |||
+ | (limited) open tap sponsored by : | ||
+ | [[File:Avi Logo Transparent Background 300pix.png|200px|link=https://avinetworks.com/]] | ||
<!-- Seventh tab --> | <!-- Seventh tab --> | ||
+ | |||
= Sponsor = | = Sponsor = | ||
Line 305: | Line 381: | ||
<!-- Don't remove these two lines! -->__NOTOC__ | <!-- Don't remove these two lines! -->__NOTOC__ | ||
<headertabs></headertabs> | <headertabs></headertabs> | ||
+ | |||
=== Made possible by our {{#switchtablink:Sponsor|Sponsors}}=== | === Made possible by our {{#switchtablink:Sponsor|Sponsors}}=== | ||
+ | '''Hosted by''' | ||
+ | [[File:Interpolis logo 2736.gif|200px|link=https://www.interpolis.nl/]] | ||
+ | |||
+ | '''Platinum:''' | ||
+ | [[File:Achmea_L1_RGB_colour.jpg|250px||link=https://www.achmea.nl/]] | ||
− | |||
'''Gold:''' | '''Gold:''' | ||
+ | [http://www.vest.nl https://www.owasp.org/images/6/67/Vest.jpg] | ||
+ | [https://secwatch.nl https://www.owasp.org/images/f/ff/Secwatch_logo_small.png] | ||
+ | [[File:Avi Logo Transparent Background 300pix.png|200px|link=https://avinetworks.com/]] | ||
+ | |||
'''Silver:''' | '''Silver:''' | ||
+ | [[File:LogoToreon.jpg|250px|link=https://www.toreon.com]] | ||
+ | [http://www.nviso.be https://www.owasp.org/images/5/5e/Nviso_logo_RGB_baseline_200px.png] | ||
+ | [http://www.sig.eu/security https://www.owasp.org/images/9/99/SIG_LOGO.png] | ||
+ | [https://www.secura.com/ https://www.owasp.org/images/7/78/Secura_logo_small.png] | ||
+ | [[File:Xebia logo-large-transparent.png|200px|link=https://xebia.com/agile-software-security]] | ||
+ | |||
'''Bronze:''' | '''Bronze:''' | ||
+ | [https://informatiebeveiliging.nl/ https://www.owasp.org/images/9/9a/Logo_Informatiebeveiliging-200.png] | ||
+ | [https://www.netsparker.com/ https://www.owasp.org/images/8/88/200x60_netsparker_logo.png] | ||
[[Category:OWASP_AppSec_Conference]] | [[Category:OWASP_AppSec_Conference]] | ||
[[Category:OWASP_BeNeLux_Archives]] | [[Category:OWASP_BeNeLux_Archives]] |
Latest revision as of 18:53, 25 September 2018
