This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Bucharest AppSec Conference 2017 Workshops"
Oana Cornea (talk | contribs) (edit2) |
Oana Cornea (talk | contribs) (edit2) |
||
| Line 7: | Line 7: | ||
| style="width:40%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | '''Description''' | | style="width:40%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | '''Description''' | ||
|- | |- | ||
| − | | style="width:10%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | 3 days training <br> 4th, 5th, 6th of October<br>daily: | + | | style="width:10%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | 3 days training <br> 4th, 5th, 6th of October<br>daily: 9:00 - 17:00<br><br> |
| style="width:25%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | Secure Coding for Java<br> | | style="width:25%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | Secure Coding for Java<br> | ||
| Line 23: | Line 23: | ||
'''Intended audience:''' The course is designed primarily for Java SE 8 developers but should also be useful to developers using older versions of the SE platform as well as Java EE and ME developers. <br> | '''Intended audience:''' The course is designed primarily for Java SE 8 developers but should also be useful to developers using older versions of the SE platform as well as Java EE and ME developers. <br> | ||
'''Skill level: The course assumes basic Java programming skills but does not assume an in-depth knowledge of software security.''' <br> | '''Skill level: The course assumes basic Java programming skills but does not assume an in-depth knowledge of software security.''' <br> | ||
| − | '''Requirements:''' | + | '''Requirements:'''laptop with Java 8 and an IDE installed |
<br> | <br> | ||
| Line 30: | Line 30: | ||
[https://www.eventbrite.com/e/owasp-bucharest-appsec-conference-2017-tickets-35356670754 Register here] | [https://www.eventbrite.com/e/owasp-bucharest-appsec-conference-2017-tickets-35356670754 Register here] | ||
|- | |- | ||
| − | | style="width:10%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | <br> | + | | style="width:10%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" |3 days training <br> 4th, 5th, 6th of October<br>daily: 9:00 - 17:00<br><br> |
| − | | style="width:25%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | <br> | + | | style="width:25%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | DFIR from Acquisition to Zbot - A comprehensive guide to real world incident handling<br> |
| − | | style="width:25%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | ''' | + | | style="width:25%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | [https://www.linkedin.com/uas/login?trk=ripf&trkInfo=AQF4NyQgGvi6uwAAAVzl75IwT7MBwugmEgdLz_SwcJoWYk_1Z7vU8s1CYx3Sxp3TuCvj4Z13LimS6vjJIGq2LcSnkXXslFYDo9u1XDfvz17JT2DnK0I49amHaxu3w6EeIw52vaI=&session_redirect=https%3A%2F%2Fwww.linkedin.com%2Fin%2Faarongoldstein Aaron Goldstein]''' |
| − | | style="width:40%" valign="middle" height="30" bgcolor="#CCEEEE" align="justify" colspan="0" | '''Description:''' | + | | style="width:40%" valign="middle" height="30" bgcolor="#CCEEEE" align="justify" colspan="0" | '''Description:''' This training will outline a proven approach to resolving incidents in an efficient, consistent manner. Topics will cover everything from evidence acquisition and verification, through hard disk and memory forensic techniques. <br> |
| − | + | The agenda includes the following, typically between 1-2 hours per topic: | |
| − | + | Evidence acquisition | |
| − | + | * Methodology for acquisition (leave no trace) | |
| + | * Media types | ||
| + | * Hashing and verification | ||
| + | * Physical vs Logical | ||
| + | * Standard Imaging Process | ||
| + | * Special cases (RAID, etc.) | ||
| + | * Open Source tools and overview (Windows / Linux) | ||
| + | |||
| + | Hard Disk Forensics Part 1 | ||
| + | * File System Types; Forensic Analysis Tools; Forensic areas of interest | ||
| + | |||
| + | Hard Disk Forensics Part 2 | ||
| + | * Registry Analysis: Key locations and format, Forensic areas of interest, NTUSER.DAT, Regripper, Regdecoder | ||
| + | * Automated Tools | ||
| − | '''Seats available: '''<br> | + | Memory forensics |
| − | '''Price: '''<br> | + | * Open Source tools and overview |
| − | [ | + | * Memory Acquisition |
| + | * Memory analysis with Volatility: Processes: Network Connections, User names / Passwords, Encryption Keys, Registry Hives, Malware | ||
| + | |||
| + | Log Analysis Techniques | ||
| + | * Common log sources | ||
| + | * Local vs Centralized Logging | ||
| + | * Retention | ||
| + | * Tampering | ||
| + | * Log analysis tools and techniques | ||
| + | |||
| + | Forensic Timeline Creation and Analysis | ||
| + | * Log2Timeline | ||
| + | |||
| + | Data Recovery Techniques | ||
| + | * Manual data carving | ||
| + | * Automated tools | ||
| + | |||
| + | Malware Analysis | ||
| + | * Open Source Intelligence Gathering | ||
| + | * Malware Sandboxing and evasion techniques | ||
| + | * File Whitelisting | ||
| + | |||
| + | Advanced Persistent Threat | ||
| + | * What an APT really is | ||
| + | * Case Study - Operation Cleaver | ||
| + | |||
| + | Anti Forensics | ||
| + | * Data shredding | ||
| + | * Steganography | ||
| + | * Timestamp modification | ||
| + | '''Intended audience:''' Security minded individuals with basic level knowledge of linux operating systems.<br> | ||
| + | '''Outcome: '''Attendees will gain critical knowledge on how to appropriately triage, and contain an incident using up to date methodology and suggestions from a trainer with extensive background in real world attacks. In addition, several tips and tricks to build and maintain an effective IR team will be provided.<br> | ||
| + | '''Requirements:'''laptops for attendees, virtual box installed<br> | ||
| + | |||
| + | '''Seats available: '''20 (first-come, first served)<br> | ||
| + | '''Price:'''1200 euros/person<br> | ||
| + | [https://www.eventbrite.com/e/owasp-bucharest-appsec-conference-2017-tickets-35356670754 Register here] | ||
Revision as of 19:48, 26 June 2017
Workshop | |||||
| Time | Title | Trainers | Description | ||
| 3 days training 4th, 5th, 6th of October daily: 9:00 - 17:00 |
Secure Coding for Java |
Robert Seacord | Description: This three-day instructor-led Secure Coding for Java course provides developers with practical guidance for developing Java programs that are robust and secure. Material in this presentation was derived from the Addison-Wesley book The CERT Oracle Secure Coding Standard for Java and is supported by the Secure Coding Rules for Java Live Lessons videos. Participants should come away from the course with a working knowledge of common programming errors that lead to software vulnerabilities, how these errors can be exploited, and effective mitigation strategies for preventing the introduction of these errors. In particular, participants will learn how to:
Moreover, the course encourages programmers to adopt security best practices and develop a security mindset that can help protect software from tomorrow’s attacks, not just today’s. Seats available: 20 (first-come, first served) | ||
| 3 days training 4th, 5th, 6th of October daily: 9:00 - 17:00 |
DFIR from Acquisition to Zbot - A comprehensive guide to real world incident handling |
Aaron Goldstein | Description: This training will outline a proven approach to resolving incidents in an efficient, consistent manner. Topics will cover everything from evidence acquisition and verification, through hard disk and memory forensic techniques. The agenda includes the following, typically between 1-2 hours per topic: Evidence acquisition
Hard Disk Forensics Part 1
Hard Disk Forensics Part 2 * Registry Analysis: Key locations and format, Forensic areas of interest, NTUSER.DAT, Regripper, Regdecoder * Automated Tools Memory forensics
Log Analysis Techniques
Forensic Timeline Creation and Analysis
Data Recovery Techniques
Malware Analysis
Advanced Persistent Threat
Anti Forensics
Intended audience: Security minded individuals with basic level knowledge of linux operating systems. Seats available: 20 (first-come, first served)
| ||
| 9:00 - 17:00 |
|
Description:
Outcome: Intended Audience: Seats available: 20 (first-come, first served) | |||
| 9:00 - 17:00 |
|
Description:
Outcome: Intended Audience: Skill Level: Seats available: 20 (first-come, first served) | |||