This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Bucharest AppSec Conference 2016 Workshops"
Oana Cornea (talk | contribs) |
Oana Cornea (talk | contribs) |
||
| Line 71: | Line 71: | ||
'''Outcome:''' After this training you will be able to create shellcodes and assembly-based binary blobs and use them for for exploiting or executable hardening. You will increase your skills in using assembly language and in working with binary exploration tools. You will understand shellcode-based attacks and you will gain basic understanding of shellcode-based attack requirements and how to mitigate them. <br> | '''Outcome:''' After this training you will be able to create shellcodes and assembly-based binary blobs and use them for for exploiting or executable hardening. You will increase your skills in using assembly language and in working with binary exploration tools. You will understand shellcode-based attacks and you will gain basic understanding of shellcode-based attack requirements and how to mitigate them. <br> | ||
| + | |||
| + | '''Intended Audience:''' System-level developers, security researchers, people interested in runtime appplication security and binary exploitation <br> | ||
| + | '''Requirements:''' | ||
| + | * Laptop with a working operating system | ||
| + | * At least 6 GB of free disk space and at least 2 GB RAM | ||
| + | * Administrative rights on the laptop | ||
| + | * VirtualBox installed<br> | ||
| + | |||
| + | '''Seats available: '''20 (first-come, first served)<br> | ||
| + | '''Price: '''200 euros/person <br> | ||
| + | [https://www.eventbrite.com/e/owasp-bucharest-appsec-conference-2016-tickets-26882929566 Register here] | ||
| + | |- | ||
| + | | style="width:10%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | 9:00 - 17:00<br><br> | ||
| + | | style="width:25%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | Practical Cryptography on the Internet'''<br> | ||
| + | |||
| + | | style="width:25%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | [https://systems.cs.pub.ro/people/sergiu.costea/ Sergiu Costea ]'''- Security Researcher at University POLITEHNICA of Bucharest''' | ||
| + | | style="width:40%" valign="middle" height="30" bgcolor="#CCEEEE" align="justify" colspan="0" | '''Description:''' Cryptography is used throughout the Internet to keep information safe. It is everywhere, from banking security tokens to Youtube streams. Simply authenticating into Facebook performs tens of different cryptographic operations to establish a secure connection.<br> | ||
| + | |||
| + | Cryptography mostly operates under the hood — we use it without having to worry about how it works. However, when something in the crypto world cracks, it cracks loudly. Heartbleed, compromised certificate authorities, identity theft, mass surveillance, bitcoin exploits worth millions of dollars — they all originate in the complex layer of cryptographic algorithms and have negative impact on our lives.<br> | ||
| + | |||
| + | In this session, we will take a very practical look at cryptography and see how it works on the Internet. Some of the topics we will cover include:<br> | ||
| + | * authentication mechanisms (PKI, certificates, certificate transparency, password storage); | ||
| + | * secure protocols (SSL, TLS and HTTPS); | ||
| + | * web application security (secure cookies, CSP, key pinning). | ||
| + | |||
| + | The training will feature many guided hands-on activities. These include, but are not limited to: creating certificate hierarchies, configuring custom certificates on clients and servers, modifying security policies, impersonating “seemingly secure” identities, downgrading connections, and extracting information from secure HTTPS sessions.<br> | ||
| + | |||
| + | We'll also explore how easily crypto breaks when used improperly, looking back at notable recent attacks and what made them possible.<br> | ||
| + | |||
| + | '''Outcome:''' After this training you will be able to:<br> | ||
| + | * Describe how Public Key Certificates work; | ||
| + | * Adequately protect information against tampering, eavesdropping and extraction attempts; | ||
| + | * Use OpenSSL to issue certificates and configure them on clients and servers; | ||
| + | * Select secure crypto algorithms when presented with the choice; | ||
| + | * Describe how secure browser to server connections are established on the Internet, including possible threats that relate to them; | ||
| + | * Enhance web application security using state of the art browser and server capabilities. <br> | ||
| + | '''Intended Audience: '''Network and web security engineers, security researchers, web developers<br> | ||
| + | |||
| + | '''Skill Level:''' intermediate, basic Linux command line skills, basic knowledge of networking, basic knowledge of HTTP <br> | ||
| + | '''Requirements:''' | ||
| + | * Laptop with a working operating system | ||
| + | * At least 6 GB of free disk space and at least 2 GB RAM | ||
| + | * Administrative rights on the laptop | ||
| + | * VirtualBox installed | ||
'''Seats available: '''20 (first-come, first served)<br> | '''Seats available: '''20 (first-come, first served)<br> | ||
Revision as of 19:00, 11 August 2016
Workshop | |||||
| Time | Title | Trainers | Description | ||
| 9:00 - 17:00 |
OWASP Top 10 vulnerabilities – discover, exploit, remediate |
Adrian Furtună – Founder & Ethical Hacker – VirtualStorm Security Ionuţ Ambrosie – Security Consultant – KPMG Romania |
Description:The purpose of this workshop is to increase the participants’ awareness on the most common web application vulnerabilities and their associated risks. We will discuss each type of vulnerability described in the OWASP Top 10 project and we will be practicing manual discovery and exploitation techniques. Furthermore, a set of useful security testing tools will be presented and used during the workshop.
Of course, we will also present safe ways in which the identified vulnerabilities can be eliminated or mitigated in production environments.
Seats available: 20 (first-come, first served) | ||
| 9:00 - 17:00 |
Secure Web Applications in Java |
Cristian Serban- AppSec Architecture Manager Lucian Suta - Software Security Trainer and Consultant |
Description: Everybody is familiar with OWASP Top 10, but how is that applicable when you write Java web applications using the Spring Framework, JSP, or FreeMarker templates? What are the security features built into the most common Java frameworks and how to apply security principles such as ‘defense in depth’ in order to build robust applications. Together we will build secure coding and secure code review skills, uncover and protect against some of the most common vulnerabilities in Java code. Intended audience: Web application developers, security testers, quality assurance personnel, people passionate about web security Seats available: 20 (first-come, first served)
| ||
| 9:00 - 17:00 |
Shellcode Development and Exploiting |
Razvan Deaconescu- Assistant Professor at University POLITEHNICA of Bucharest Mihai Țigănuș - Master Student at University POLITEHNICA of Bucharest |
Description: Shellcodes are small pieces of executable code that provide arbitrary functionality to a given program. They are usually obtained from assembly source code and used in runtime application security to exploit a vulnerability in the program and alter the execution flow, i.e. arbitrary code execution attack. In this training we will provide you with the know-how and skills to create shellcodes and construct basic attack vectors using shellcodes. You will better understand how programs and processes work. The training is highly practical. We will use a Linux environment and common Linux tools for static and dynamic analysis, shellcode creation and exploiting. The training will feature hands-on activities such as:
We will present different scenarios for vulnerable programs and then create the shellcode-based attack vectors to exploit them. Outcome: After this training you will be able to create shellcodes and assembly-based binary blobs and use them for for exploiting or executable hardening. You will increase your skills in using assembly language and in working with binary exploration tools. You will understand shellcode-based attacks and you will gain basic understanding of shellcode-based attack requirements and how to mitigate them. Intended Audience: System-level developers, security researchers, people interested in runtime appplication security and binary exploitation
Seats available: 20 (first-come, first served) | ||
| 9:00 - 17:00 |
Practical Cryptography on the Internet |
Sergiu Costea - Security Researcher at University POLITEHNICA of Bucharest | Description: Cryptography is used throughout the Internet to keep information safe. It is everywhere, from banking security tokens to Youtube streams. Simply authenticating into Facebook performs tens of different cryptographic operations to establish a secure connection. Cryptography mostly operates under the hood — we use it without having to worry about how it works. However, when something in the crypto world cracks, it cracks loudly. Heartbleed, compromised certificate authorities, identity theft, mass surveillance, bitcoin exploits worth millions of dollars — they all originate in the complex layer of cryptographic algorithms and have negative impact on our lives. In this session, we will take a very practical look at cryptography and see how it works on the Internet. Some of the topics we will cover include:
The training will feature many guided hands-on activities. These include, but are not limited to: creating certificate hierarchies, configuring custom certificates on clients and servers, modifying security policies, impersonating “seemingly secure” identities, downgrading connections, and extracting information from secure HTTPS sessions. We'll also explore how easily crypto breaks when used improperly, looking back at notable recent attacks and what made them possible. Outcome: After this training you will be able to:
Intended Audience: Network and web security engineers, security researchers, web developers Skill Level: intermediate, basic Linux command line skills, basic knowledge of networking, basic knowledge of HTTP
Seats available: 20 (first-come, first served) | ||