This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP AppSec DC 2012/Schedule/4-4-2012"
From OWASP
Mark.bristow (talk | contribs) |
Mark.bristow (talk | contribs) |
||
Line 44: | Line 44: | ||
Joshua Corman | Joshua Corman | ||
|- | |- | ||
− | | width=72 valign=middle bgcolor=#7b8abd | 12:50 PM - 2: | + | | width=72 valign=middle bgcolor=#7b8abd | 12:50 PM - 2:30 PM |
| valign=middle height=30 bgcolor=#e0e0e0 align=center colspan=4 | No-Host Lunch | | valign=middle height=30 bgcolor=#e0e0e0 align=center colspan=4 | No-Host Lunch | ||
|- | |- | ||
− | | width=72 valign=middle bgcolor=#7b8abd | 2: | + | | width=72 valign=middle bgcolor=#7b8abd | 2:30 PM - 3:20 PM |
| align=center width=200 valign=middle height=60 bgcolor=#c0a0a0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Hacking_NETC_Applications_The_Black_Arts Hacking .NET(C#) Applications: The Black Arts]<br><br> | | align=center width=200 valign=middle height=60 bgcolor=#c0a0a0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Hacking_NETC_Applications_The_Black_Arts Hacking .NET(C#) Applications: The Black Arts]<br><br> | ||
Jon McCoy | Jon McCoy | ||
Line 57: | Line 57: | ||
Joe Jarzombek, Bob Martin, Walter Houser and Tom Brennan | Joe Jarzombek, Bob Martin, Walter Houser and Tom Brennan | ||
|- | |- | ||
− | | width=72 valign=middle bgcolor=#7b8abd | | + | | width=72 valign=middle bgcolor=#7b8abd | 3:20 PM - 3:30 PM |
| valign=middle height=30 bgcolor=#e0e0e0 align=center colspan=3 | Coffee Break | | valign=middle height=30 bgcolor=#e0e0e0 align=center colspan=3 | Coffee Break | ||
|- | |- | ||
− | | width=72 valign=middle bgcolor=#7b8abd | 3: | + | | width=72 valign=middle bgcolor=#7b8abd | 3:30 PM - 4:20 PM |
| align=center width=200 valign=middle height=60 bgcolor=#c0a0a0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/OWASP_Broken_Web_Applications_OWASP_BWA_10_Release OWASP Broken Web Applications (OWASP BWA) 1.0 Release]<br><br> | | align=center width=200 valign=middle height=60 bgcolor=#c0a0a0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/OWASP_Broken_Web_Applications_OWASP_BWA_10_Release OWASP Broken Web Applications (OWASP BWA) 1.0 Release]<br><br> | ||
Chuck Willis | Chuck Willis | ||
Line 69: | Line 69: | ||
Charles Henderson and David Byrne | Charles Henderson and David Byrne | ||
|- | |- | ||
− | | width=72 valign=middle bgcolor=#7b8abd | | + | | width=72 valign=middle bgcolor=#7b8abd | 4:20 PM - 4:30 PM |
| valign=middle height=30 bgcolor=#e0e0e0 align=center colspan=4 | Coffee Break | | valign=middle height=30 bgcolor=#e0e0e0 align=center colspan=4 | Coffee Break | ||
|- | |- | ||
− | | width=72 valign=middle bgcolor=#7b8abd | 4: | + | | width=72 valign=middle bgcolor=#7b8abd | 4:30 PM - 5:20 PM |
| align=center width=200 valign=middle height=60 bgcolor=#c0a0a0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/New_and_Improved_Hacking_Oracle_from_Web New and Improved Hacking Oracle from Web]<br><br> | | align=center width=200 valign=middle height=60 bgcolor=#c0a0a0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/New_and_Improved_Hacking_Oracle_from_Web New and Improved Hacking Oracle from Web]<br><br> | ||
Sumit Siddharth | Sumit Siddharth | ||
Line 83: | Line 83: | ||
Ron Ross, Joe Jarzombek, Kris Britton & Darren Death | Ron Ross, Joe Jarzombek, Kris Britton & Darren Death | ||
|- | |- | ||
− | | width=72 valign=middle bgcolor=#7b8abd | | + | | width=72 valign=middle bgcolor=#7b8abd | 5:20 PM - 5:30 PM |
| valign=middle height=30 bgcolor=#e0e0e0 align=center colspan=3 | Coffee Break | | valign=middle height=30 bgcolor=#e0e0e0 align=center colspan=3 | Coffee Break | ||
|- | |- | ||
− | | width=72 valign=middle bgcolor=#7b8abd | 5: | + | | width=72 valign=middle bgcolor=#7b8abd | 5:30 PM - 6:20 PM |
| align=center width=200 valign=middle height=60 bgcolor=#c0a0a0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Unraveling_some_of_the_Mysteries_around_DOMbased_XSS Unraveling some of the Mysteries around DOM-based XSS]<br><br> | | align=center width=200 valign=middle height=60 bgcolor=#c0a0a0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Unraveling_some_of_the_Mysteries_around_DOMbased_XSS Unraveling some of the Mysteries around DOM-based XSS]<br><br> | ||
Dave Wichers | Dave Wichers | ||
Line 94: | Line 94: | ||
Karen Mercedes Goertzel | Karen Mercedes Goertzel | ||
|- | |- | ||
− | | width=72 valign=middle bgcolor=#7b8abd | 6: | + | | width=72 valign=middle bgcolor=#7b8abd | 6:20 PM |
− | | valign=middle height=30 bgcolor=#e0e0e0 align=center colspan=4 | Networking Opportunity sponsored by: [[Image:SPL-LOGO-MED.png|link=https://www.trustwave.com/]] | + | | valign=middle height=30 bgcolor=#e0e0e0 align=center colspan=4 | Networking Opportunity in Room 207AB sponsored by: [[Image:SPL-LOGO-MED.png|link=https://www.trustwave.com/]] |
|} | |} |
Revision as of 17:30, 28 March 2012
Plenary Day 1 - 4/4/2012 | ||||
Offense & Tools Room 201 |
Case Studies Room 202A |
IoMT Room 202B |
Interrogate! Room 206 | |
---|---|---|---|---|
7:30 AM - 8:50 AM | Registration | |||
8:50 AM - 9:00 AM | Welcome and Opening Remarks Room 202A | |||
9:00 AM - 10:00 AM | Keynote: Dan Geer Room 202A | |||
10:00 AM - 10:45 AM | OWASP Board Room 202A | |||
10:45 AM - 11:00 AM | Coffee Break | |||
11:00 AM - 11:50 AM | DOMJacking - Attack, Exploit and Defense Shreeraj Shah |
The Unfortunate Reality of Insecure Libraries Jeff Williams and Arshan Dabirsiaghi |
Python Basics for Web App Pentesters - Part 2 Justin Searle |
Integrating Application Security into your Lifecycle and Procurement Moderator: Jim Manico |
11:50 AM - 12:00 PM | Coffee Break | |||
12:00 PM - 12:50 PM | Attacking CAPTCHAs for Fun and Profit Gursev Singh Kalra |
Case Study: How New Software Assurance Policy Reduces Risk and Costs Rob Roy |
Security is Dead. Long Live Rugged DevOps: IT at Ludicrous Speed Joshua Corman | |
12:50 PM - 2:30 PM | No-Host Lunch | |||
2:30 PM - 3:20 PM | Hacking .NET(C#) Applications: The Black Arts Jon McCoy |
Security at scale: Web application security in a continuous deployment environment Zane Lackey |
The "Easy" Button for Your Web Application Security Career Salvador Grec |
Risk Analysis and Measurement with CWRAF Joe Jarzombek, Bob Martin, Walter Houser and Tom Brennan |
3:20 PM - 3:30 PM | Coffee Break | |||
3:30 PM - 4:20 PM | OWASP Broken Web Applications (OWASP BWA) 1.0 Release Chuck Willis |
Security Is Like An Onion, That's Why It Makes You Cry |
Anatomy of a Logic Flaw Charles Henderson and David Byrne | |
4:20 PM - 4:30 PM | Coffee Break | |||
4:30 PM - 5:20 PM | New and Improved Hacking Oracle from Web Sumit Siddharth |
State of Web Security Robert Rowley |
Old Webshells, New Tricks -- How Persistent Threats have revived an old idea, and how you can detect them. Ryan Kazanciyan |
Fed Panel Moderator: Rex Booth |
5:20 PM - 5:30 PM | Coffee Break | |||
5:30 PM - 6:20 PM | Unraveling some of the Mysteries around DOM-based XSS Dave Wichers |
2012 Global Security Report Tom Brennan and Nick Percoco |
Survivable Software for Cyber-Physical Systems Karen Mercedes Goertzel | |
6:20 PM | Networking Opportunity in Room 207AB sponsored by: |