This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Cambridge"

From OWASP
Jump to: navigation, search
m
Line 7: Line 7:
 
'''Cambridge OWASP Chapter Meeting
 
'''Cambridge OWASP Chapter Meeting
  
Tuesday 12th November 2013 17:30 – 20:30 (Anglia Ruskin University, East ROad, Cambridge LAB002/LAB107)
+
Tuesday 4th February 17:30 – 20:30 (Anglia Ruskin University, East ROad, Cambridge LAB003)
  
 
Hosted by the Department of Computing & Technology, Anglia Ruskin University, OWASP (Open Web Application Security Project) Cambridge Chapter and IEEE Industrial Electronics Chapter
 
Hosted by the Department of Computing & Technology, Anglia Ruskin University, OWASP (Open Web Application Security Project) Cambridge Chapter and IEEE Industrial Electronics Chapter
Line 13: Line 13:
 
'''Guest speaker(s):'''
 
'''Guest speaker(s):'''
  
'''Paul Cain:'''  
+
'''Yiannis Chrysanthou (KPMG):'''  
Over 12 years experience working in the field of computer forensics.
+
Yiannis has been in the information security field for about 6 years now. Prior to joining KPMG, he was an Ethical Hacking Instructor and a Project Manager for various infrastructure projects.
Cutting the bytes within law enforcement more recently within a commercial environment. Conducting investigations on digital devices, providing witness evidence in court and author / teacher of the 7Safe forensic courses.
 
  
'''James Forshaw:'''
+
He is an active member of Team Hashcat. Winner of Crackmeifyoucan competition at Defcon (2nd place in 2013,1st place in 2012, 2nd place in 2011 and 1st place in 2010), Winner of Positive Hackdays / Hashrunner (1st place 2012,2nd place 2013).
James is the Head of Vulnerability Research at Context Information Security in the UK. He has been involved with computer hardware and software security for over 10 years with a skill set which covers the bread and butter of the security industry such as application testing, through to more bespoke product assessment, vulnerability analysis and exploitation. He has numerous public vulnerabilities disclosures in many different products including web browser issues and virtual machine breakouts as well as being a Pwn2Own and Microsoft Mitigation Bypass bounty winner.
 
  
He has spoken at a number of security conferences in the past, on a range of different topics such including managed language security at Blackhat USA, CanSecWest and Bluehat, Sony Playstation Portable hacking at Chaos Computer Congress, WebGL exploitation at Ruxcon and Citrix network exploitation at Blackhat Europe. He is also the developer of the free CANAPE networking analysis and exploitation tool.
+
'''Damien King (KPMG):'''
 +
Damien has 1st class BSc Applied Computer Science; Distinction &  MSc Information Security; Dissertation in Mobile Device Exploitation. 
  
 +
He is currently a Penetration Tester at KPMG and likes to hack “stuff”.
 +
 +
He also have an interest in automation/scripting in python - hence the exploitation tool he will present. 
 
----
 
----
  
Line 27: Line 29:
 
'''Agenda'''
 
'''Agenda'''
  
17:30 – 17:45 Welcome from the OWASP Cambridge Chapter Leader,  Adrian Winckles, Senior Lecturer in  Information Security, Anglia Ruskin University   
+
17:30 – 17:45 Welcome from the OWASP Cambridge Chapter Leader,  Adrian Winckles, Course Leader in  Information Security & Forensic Computing, Anglia Ruskin University   
  
17:45 – 18:30 Paul Cain  (7Safe, PA Consulting) - Tracking Data using Forensics
+
17:45 – 18:30 Yiannis Chrysanthou (KPMG) - Modern Password Cracking
  
18:30 – 19:15 James Forshaw (Context Information Security) - The Forger's Art: Exploiting XML Digital Signature Implementations
+
18:30 – 19:15 Damien King (KPMG) - Filename Enumeration with TildeTool
  
19:15 – 19:30 Q & A
+
19:00 – 19:15 Q & A
  
19:30 – 20:00  Refreshments & Networking (coffee, tea, juice) in LAB006
+
19:15 – 20:00  Refreshments & Networking (coffee, tea, juice) in LAB006
  
 
----
 
----
Line 41: Line 43:
 
'''Registration:'''  
 
'''Registration:'''  
  
To register for this free event, please register online at
+
To register for this free event, please register online  
 
+
[https://www.surveymonkey.com/s/OWASP_Feb2014 here]
[http://www.eventbrite.com/event/9178305559 Cambridge Chapter Registration]
 
  
The conference will be held in the Lord Ashcroft Building, Room LAB107 (Breakout Room LAB006 for networking & refreshments).
+
The conference will be held in the Lord Ashcroft Building, Room LAB003 (Breakout Room LAB006 for networking & refreshments).
  
 
Please enter through the Helmore Building and ask at reception.
 
Please enter through the Helmore Building and ask at reception.
Line 71: Line 72:
 
|- valign="top" align="left"
 
|- valign="top" align="left"
 
! width="150" | Name Speaker
 
! width="150" | Name Speaker
| Paul Cain
+
| Yiannis Chrysanthou (KPMG)
 
|- valign="top" align="left"
 
|- valign="top" align="left"
 
! Bio
 
! Bio
| Over 12 years experience working in the field of computer forensics.
+
| Yiannis has been in the information security field for about 6 years now. Prior to joining KPMG, he was an Ethical Hacking Instructor and a Project Manager for various infrastructure projects.
Cutting the bytes within law enforcement more recently within a commercial environment. Conducting investigations on digital devices, providing witness evidence in court and author / teacher of the 7Safe forensic courses.
+
He is an active member of Team Hashcat. Winner of Crackmeifyoucan competition at Defcon (2nd place in 2013,1st place in 2012, 2nd place in 2011 and 1st place in 2010), Winner of Positive Hackdays / Hashrunner (1st place 2012,2nd place 2013).
 
|- valign="top" align="left"
 
|- valign="top" align="left"
 
! Title
 
! Title
| Tracking Data using Forensics
+
| Modern Password Cracking
 
|- valign="top" align="left"
 
|- valign="top" align="left"
 
! Abstract
 
! Abstract
| IP data theft is becoming more common. Many data compromises are exploited from the internal threat. Using case studies this presentation will demonstrate forensic artefacts to provide some answers to how and what data was taken.
+
| This presentation briefly describes the most popular password cracking techniques. It then suggests an optimized attack that combines several techniques with best performance in mind. The presentation suggests the use of Markov Chains for password recovery, in combination with a range of other modified versions of common attacks.
 +
 
 +
All attacks work together and make use of common resources such as Dictionaries, and Rulesets to achieve the most optimal output possible. The result is a dynamic, highly flexible and robust attack that can be used by anyone with average computer literacy and limited resources within reasonable time.
 
|-
 
|-
 
|
 
|
 
|- valign="top"  align="left"
 
|- valign="top"  align="left"
 
! Name Speaker
 
! Name Speaker
| James Forshaw
+
| Damien King (KPMG)
 
|- valign="top" align="left"
 
|- valign="top" align="left"
 
! Bio
 
! Bio
| James is the Head of Vulnerability Research at Context Information Security in the UK. He has been involved with computer hardware and software security for over 10 years with a skill set which covers the bread and butter of the security industry such as application testing, through to more bespoke product assessment, vulnerability analysis and exploitation. He has numerous public vulnerabilities disclosures in many different products including web browser issues and virtual machine breakouts as well as being a Pwn2Own and Microsoft Mitigation Bypass bounty winner.
+
| Damien has 1st class BSc Applied Computer Science; Distinction &  MSc Information Security; Dissertation in Mobile Device Exploitation. 
 +
 
 +
He is currently a Penetration Tester at KPMG and likes to hack “stuff”.
  
He has spoken at a number of security conferences in the past, on a range of different topics such including managed language security at Blackhat USA, CanSecWest and Bluehat, Sony Playstation Portable hacking at Chaos Computer Congress, WebGL exploitation at Ruxcon and Citrix network exploitation at Blackhat Europe. He is also the developer of the free CANAPE networking analysis and exploitation tool.
+
He also have an interest in automation/scripting in python - hence the exploitation tool he will present.
 
|- valign="top" align="left"
 
|- valign="top" align="left"
 
! Title
 
! Title
| The Forger's Art: Exploiting XML Digital Signature Implementations
+
| Filename Enumeration with TildeTool
 
|- valign="top" align="left"
 
|- valign="top" align="left"
 
! Abstract
 
! Abstract
| Many security critical systems rely on the correct implementation of the XML Digital Signature standard for the purposes of verification and identity management. Technologies such as SAML and Web Service Security use the standard, and its sibling XML Encryption, to manage the security of these technologies. Being a standard there is, unsurprisingly, no canonical implementation for any platform or language, with so many different developments there are likely to be differences in how the standard is interpreted.  
+
| In certain versions of Microsoft IIS, it is possible to detect the short names of files and directories which have an 8.3 file naming scheme (e.g. FILENA~1.TXT) equivalent in Windows.
  
While a fair amount research has been done into the effects of the standard such as it allowing signature wrapping attacks, these tend to be exposed due to poor usages of the XML Digital Signature libraries. Comparatively little research has been undertaken in the implementations themselves, how they diverge from the standard, how they ensure security and whether there are any vulnerabilities in the implementations themselves.  
+
This issue particularly affects .Net websites that are vulnerable to direct URL access, as an attacker can find important files and folders that they are not normally visible.
  
This presentation is about research done against the main open and closed source implementations of XML Digital Signatures, how they can be exploited to gain remote code execution, signature verification bypass or denial of service. It will show some of the more nasty vulnerabilities found during the research including a novel attack against the built-in Java and .NET libraries which allow for trivial signature spoofing exposing any user of those implementations into accepting an invalid signature which is independent of their usage.
+
We will first talk through the steps of how to test for this vulnerability manually, then demonstrate 'TildeTool' which automates the process.
 
|}
 
|}
  
Line 119: Line 124:
 
| Nikhil Sreekumar / Power On, Powershell
 
| Nikhil Sreekumar / Power On, Powershell
 
| [http://www.slideshare.net/Roo7break/power-on-powershell presentation]
 
| [http://www.slideshare.net/Roo7break/power-on-powershell presentation]
 +
|-
 +
| 12th November 2013
 +
| Paul Cain / Tracking Data using Forensics
 +
|
 +
|-
 +
| 12th November 2013
 +
| James Forshaw/ The Forger's Art: Exploiting XML Digital Signature Implementations
 +
|
 
|}
 
|}
  

Revision as of 16:47, 28 January 2014

OWASP Cambridge

Welcome to the Cambridge chapter homepage. The chapter leaders are Adrian Winckles and Steven van der Baan.


Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter. Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG


<paypal>Cambridge</paypal>

Local News

Cambridge OWASP Chapter Meeting

Tuesday 4th February 17:30 – 20:30 (Anglia Ruskin University, East ROad, Cambridge LAB003)

Hosted by the Department of Computing & Technology, Anglia Ruskin University, OWASP (Open Web Application Security Project) Cambridge Chapter and IEEE Industrial Electronics Chapter

Guest speaker(s):

Yiannis Chrysanthou (KPMG): Yiannis has been in the information security field for about 6 years now. Prior to joining KPMG, he was an Ethical Hacking Instructor and a Project Manager for various infrastructure projects.

He is an active member of Team Hashcat. Winner of Crackmeifyoucan competition at Defcon (2nd place in 2013,1st place in 2012, 2nd place in 2011 and 1st place in 2010), Winner of Positive Hackdays / Hashrunner (1st place 2012,2nd place 2013).

Damien King (KPMG): Damien has 1st class BSc Applied Computer Science; Distinction & MSc Information Security; Dissertation in Mobile Device Exploitation. 

He is currently a Penetration Tester at KPMG and likes to hack “stuff”.

He also have an interest in automation/scripting in python - hence the exploitation tool he will present.



Agenda

17:30 – 17:45 Welcome from the OWASP Cambridge Chapter Leader, Adrian Winckles, Course Leader in Information Security & Forensic Computing, Anglia Ruskin University

17:45 – 18:30 Yiannis Chrysanthou (KPMG) - Modern Password Cracking

18:30 – 19:15 Damien King (KPMG) - Filename Enumeration with TildeTool

19:00 – 19:15 Q & A

19:15 – 20:00 Refreshments & Networking (coffee, tea, juice) in LAB006


Registration:

To register for this free event, please register online here

The conference will be held in the Lord Ashcroft Building, Room LAB003 (Breakout Room LAB006 for networking & refreshments).

Please enter through the Helmore Building and ask at reception.

Anglia Ruskin University Cambridge Campus East Road Cambridge CB1 1PT

Get further information on travelling to the university.

http://www.anglia.ac.uk/ruskin/en/home/your_university/anglia_ruskin_campuses/cambridge_campus/find_cambridge.html


Meeting Location

Everyone is welcome to join us at our chapter meetings.

Next talks

Name Speaker Yiannis Chrysanthou (KPMG)
Bio Yiannis has been in the information security field for about 6 years now. Prior to joining KPMG, he was an Ethical Hacking Instructor and a Project Manager for various infrastructure projects.

He is an active member of Team Hashcat. Winner of Crackmeifyoucan competition at Defcon (2nd place in 2013,1st place in 2012, 2nd place in 2011 and 1st place in 2010), Winner of Positive Hackdays / Hashrunner (1st place 2012,2nd place 2013).

Title Modern Password Cracking
Abstract This presentation briefly describes the most popular password cracking techniques. It then suggests an optimized attack that combines several techniques with best performance in mind. The presentation suggests the use of Markov Chains for password recovery, in combination with a range of other modified versions of common attacks.

All attacks work together and make use of common resources such as Dictionaries, and Rulesets to achieve the most optimal output possible. The result is a dynamic, highly flexible and robust attack that can be used by anyone with average computer literacy and limited resources within reasonable time.

Name Speaker Damien King (KPMG)
Bio Damien has 1st class BSc Applied Computer Science; Distinction & MSc Information Security; Dissertation in Mobile Device Exploitation. 

He is currently a Penetration Tester at KPMG and likes to hack “stuff”.

He also have an interest in automation/scripting in python - hence the exploitation tool he will present.

Title Filename Enumeration with TildeTool
Abstract In certain versions of Microsoft IIS, it is possible to detect the short names of files and directories which have an 8.3 file naming scheme (e.g. FILENA~1.TXT) equivalent in Windows.

This issue particularly affects .Net websites that are vulnerable to direct URL access, as an attacker can find important files and folders that they are not normally visible.

We will first talk through the steps of how to test for this vulnerability manually, then demonstrate 'TildeTool' which automates the process.


Date Name / Title Link
5th March 2013 Sarantis Makoudis / Android (in)Security presentation
5th March 2013 Nikhil Sreekumar / Power On, Powershell presentation
12th November 2013 Paul Cain / Tracking Data using Forensics
12th November 2013 James Forshaw/ The Forger's Art: Exploiting XML Digital Signature Implementations