|
|
Line 65: |
Line 65: |
| | | |
| Everyone is welcome to join us at our chapter meetings. | | Everyone is welcome to join us at our chapter meetings. |
− |
| |
− | <!-- second tab -->
| |
− | = Talks & Abstract =
| |
− | ==='''Next talks'''===
| |
− |
| |
− | {|class="wikitable" border="1" |
| |
− | |- valign="top" align="left"
| |
− | ! width="150" | Name Speaker
| |
− | | Yiannis Chrysanthou (KPMG)
| |
− | |- valign="top" align="left"
| |
− | ! Bio
| |
− | | Yiannis has been in the information security field for about 6 years now. Prior to joining KPMG, he was an Ethical Hacking Instructor and a Project Manager for various infrastructure projects.
| |
− | He is an active member of Team Hashcat. Winner of Crackmeifyoucan competition at Defcon (2nd place in 2013,1st place in 2012, 2nd place in 2011 and 1st place in 2010), Winner of Positive Hackdays / Hashrunner (1st place 2012,2nd place 2013).
| |
− | |- valign="top" align="left"
| |
− | ! Title
| |
− | | Modern Password Cracking
| |
− | |- valign="top" align="left"
| |
− | ! Abstract
| |
− | | This presentation briefly describes the most popular password cracking techniques. It then suggests an optimized attack that combines several techniques with best performance in mind. The presentation suggests the use of Markov Chains for password recovery, in combination with a range of other modified versions of common attacks.
| |
− |
| |
− | All attacks work together and make use of common resources such as Dictionaries, and Rulesets to achieve the most optimal output possible. The result is a dynamic, highly flexible and robust attack that can be used by anyone with average computer literacy and limited resources within reasonable time.
| |
− | |-
| |
− | |
| |
− | |- valign="top" align="left"
| |
− | ! Name Speaker
| |
− | | Damien King (KPMG)
| |
− | |- valign="top" align="left"
| |
− | ! Bio
| |
− | | Damien has 1st class BSc Applied Computer Science; Distinction & MSc Information Security; Dissertation in Mobile Device Exploitation.
| |
− |
| |
− | He is currently a Penetration Tester at KPMG focusing on mobile and web application security.
| |
− |
| |
− | He also have an interest in automation/scripting in python - hence the exploitation tool he will present.
| |
− | |- valign="top" align="left"
| |
− | ! Title
| |
− | | Filename Enumeration with TildeTool
| |
− | |- valign="top" align="left"
| |
− | ! Abstract
| |
− | | In certain versions of Microsoft IIS, it is possible to detect the short names of files and directories which have an 8.3 file naming scheme (e.g. FILENA~1.TXT) equivalent in Windows.
| |
− |
| |
− | This issue particularly affects .Net websites that are vulnerable to direct URL access, as an attacker can find important files and folders that they are not normally visible.
| |
− |
| |
− | We will first talk through the steps of how to test for this vulnerability manually, then demonstrate 'TildeTool' which automates the process.
| |
− | |}
| |
| | | |
| | | |
Revision as of 14:56, 14 November 2014
OWASP Cambridge
Welcome to the Cambridge chapter homepage. The chapter leaders are Adrian Winckles and Steven van der Baan.
Participation
OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.
to this chapter or become a local chapter supporter.
Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member?
<paypal>Cambridge</paypal>