This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Mumbai"

From OWASP
Jump to: navigation, search
Line 12: Line 12:
 
<br>
 
<br>
 
Date:
 
Date:
     Sunday January 10, 2016.
+
     Sunday February 21, 2016.
  
 
Sessions:
 
Sessions:
     10:00 AM     10:10 AM    Introduction,
+
     09:00 AM - 01:00 PM Advanced Malware Analysis using Cuckoo Sandbox & Honeypot.
    10:10 AM     10:50 AM    Picture Forensics using Ghiro Appliance by Sumit Shrivastava,
+
 
     10:50 AM     11:10 AM    News Bytes by Neelu Tripathy,
+
Agenda:
     11:10 AM     11:20 AM    Networking Break,
+
     To analyse malwares using automated and manual methods
     11:20 AM    12:10 PM    M2: Insecure Data Storage vulnerability in android application by Nitesh Malviya,
+
    • Cuckoo Automated Malware Analysis
     12:10 PM     12:20 PM    Feedback & Review
+
    • SIEM malware Triage
 +
    • Clam AV signature correlation
 +
    • Remnux docx, xlsx, pptx and pdf analysis
 +
     • Malware file extraction from Pcap and from disk images with mmls, icat,
 +
    istat
 +
    • Windows rootkit analysis with WinDBG and Windows data structures like
 +
     EPROCESS, Process Environment Block and Thread Local Storage
 +
    • Ransomware analysis
 +
     • Extract live memory dump and disk image of an exploited - windows machine
 +
     with WinDD, DumpIT and analyse the same with Volatility, Foremost Analyse a
 +
     live memory dump and disk image of an exploited Linux machine with LiME,
 +
     Volatility and TSK
 +
     • Capture live Malwares with Nepenthes
  
 
Venue:
 
Venue:
     Directi,
+
     The number of seats are limited hence selected participants would be
     Directiplex,
+
     informed via email about their selection as well as venue.
    Old Nagardas Road,
+
 
     Next to Andheri Subway,
+
     Please fill out the form here http://goo.gl/forms/btrTGfSSsm required to
     Andheri (East),
+
     filter out Humla attendees. Registration will close at 12:59 hrs of
     Mumbai, Maharashtra 400069
+
     February 20, 2016.
    Map http://g.co/maps/5gt23
+
 
 +
 
 +
 
 
<br>
 
<br>
 
Stay tuned or visit our [http://lists.owasp.org/mailman/listinfo/owasp-mumbai mailing list] for information about recent and upcoming Events.
 
Stay tuned or visit our [http://lists.owasp.org/mailman/listinfo/owasp-mumbai mailing list] for information about recent and upcoming Events.

Revision as of 20:46, 18 February 2016

OWASP Mumbai

Welcome to the Mumbai chapter homepage. The chapter leader is Narenda Choyal Join us at our mailing list


Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter. Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG


<paypal>Mumbai</paypal>

Local News

Everyone is welcome to join us at our chapter meetings.

Events


Date:

   Sunday February 21, 2016.

Sessions:

   09:00 AM - 01:00 PM Advanced Malware Analysis using Cuckoo Sandbox & Honeypot.

Agenda:

   To analyse malwares using automated and manual methods
   • Cuckoo Automated Malware Analysis
   • SIEM malware Triage
   • Clam AV signature correlation
   • Remnux docx, xlsx, pptx and pdf analysis
   • Malware file extraction from Pcap and from disk images with mmls, icat,
   istat
   • Windows rootkit analysis with WinDBG and Windows data structures like
   EPROCESS, Process Environment Block and Thread Local Storage
   • Ransomware analysis
   • Extract live memory dump and disk image of an exploited - windows machine
   with WinDD, DumpIT and analyse the same with Volatility, Foremost Analyse a
   live memory dump and disk image of an exploited Linux machine with LiME,
   Volatility and TSK
   • Capture live Malwares with Nepenthes

Venue:

   The number of seats are limited hence selected participants would be
   informed via email about their selection as well as venue.
   Please fill out the form here http://goo.gl/forms/btrTGfSSsm required to
   filter out Humla attendees. Registration will close at 12:59 hrs of
   February 20, 2016.



Stay tuned or visit our mailing list for information about recent and upcoming Events.