This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Cork
- 1 OWASP Cork
- 2 Participation
- 3 Sponsorship/Membership
- 4 OWASP Cork Board
- 5 Chapter Meetings - 2015
- 5.1 TBD - SNEAK PREVIEW ONLY - Feb 2016 Chapter Meeting - Docker Security and SSL/TLS Recent Issues
- 5.2 November Chapter Meeting - PCI DSS Pen Testing / IAM (Identity & Access Mgmt)
- 5.3 Top 10 Workshop #5 (Broken Auth & Session Mgmt, Security Misconfiguration and Sensitive Data Exposure) - 15 Oct 2015
- 5.4 Top 10 Workshop #4 (XSS & Unvalidated Redirects and Forwards) - 10 Sept 2015
- 5.5 Top 10 Workshop #3 (Injection) - 28 July 2015
- 5.6 Top 10 Workshop #2 (CSRF & Insecure Components) - 25 June 2015
- 5.7 Top 10 Workshop #1 (Test Environment Setup & Direct Object Reference) - 28 May 2015
- 5.8 Cork Security Event - Mach 24
- 6 Chapter Meetings - 2014
- 7 Other OWASP Chapters in Ireland
OWASP Cork
Welcome to the Cork chapter homepage.
Participation
OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.
Sponsorship/Membership
to this chapter or become a local chapter supporter.
Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member?
Becoming a chapter sponsor means that you get your organisation mentioned in meeting promotion (including on this page if desired), recognition at the beginning of the meeting and promotional material at the meeting.
We currently have the following sponsorship options available:
€250 for an individual meeting sponsorship
€1500 for annual chapter sponsorship
Contact any of the board members below for more information.
OWASP Cork Board
Should you have a question about the local chapter, would like to get more involved contact any of the following people below
Chapter Leads:
Details and registration for all chapter meetings are available on our Meet-Up page: http://www.meetup.com/OWASP-Cork/
Chapter Meetings - 2015
TBD - SNEAK PREVIEW ONLY - Feb 2016 Chapter Meeting - Docker Security and SSL/TLS Recent Issues
TBD - SNEAK PREVIEW ONLY - December Chapter Meeting - Docker Security and SSL/TLS Recent Issues | |
When | Where |
TBC Doors: 19:00 Talks start: 19:10 |
Venue Location: TBC
To Find Us: click here |
SLIDES FOR THIS MONTH | |
TBD - After event | |
DESCRIPTION | |
TBD - THIS IS JUST A SNEAK PREVIEW Talk #1 - SSL/TLS Recent Security Issues Speaker Bio: Juan Galiana Juan Galiana works as the EMEA Security Technical Lead for IBM Cloud Services, in this role he is responsible for securing infrastructure, platform and applications hosted by IBM and delivered as a service to hundreds of thousands of customers across the globe. Apart from his work at IBM, he contributes to open source projects like the Browser Exploitation Framework (BeEF), he is co-author of the OWASP Testing Guide 4.0 and the HTML5 Security Cheat Sheet project lead. He is a regular speaker in Security Conferences, among others he presented at OWASP Europe and AppSec USA. Talk #2 - About Docker Speaker Bio: Tom Barlow Software Engineer, Docker, Inc. Tom Barlow (@tomwbarlow) is helping to build enterprise products and solutions at Docker, Inc. He became interested in container technologies whilst working at HP and found that Docker's solid product made packaging up an application for deployment easy. He's currently involved in coming up with solutions to some of the challenges around orchestration, discoverability, monitoring, log management and support of Docker infrastructure. Talk #3 - Docker Security Speaker Bio: Juan Galiana ^ See Info Above ^ Speaker Bio: David Lynch David Lynch is a Security Specialist with IBM Cloud Services. His areas of expertise are Threat Intelligence, SIEM, Patch Management and Encryption. David started as a security engineer for IBM SaaS, he then progressed to security compliance and SME and is currently transitioning to Ethical Hacking with IBM Cloud. Externally David is currently finalising his Masters in Forensics and Cyber Security. Afterwards ... Some sort of Christmas get-together. Not decided yet, but watch this space!! |
November Chapter Meeting - PCI DSS Pen Testing / IAM (Identity & Access Mgmt)
November Chapter Meeting - PCI DSS Pen Testing / IAM (Identity & Access Mgmt) | |
When | Where |
Thursday 12th Nov 2015 Doors: 19:00 Talks start: 19:10 |
Venue Location: Cashmans (upstairs), 26 Academy Street, Cork
To Find Us: click here |
SLIDES FOR THIS MONTH | |
TBD - After event | |
DESCRIPTION | |
On Thursday November 12th we have two great speakers lined up for our next chapter meeting. Both posses great experience in their respective areas, so can get across the information and answer your questions that might not be so easy to find in the books. Stephen O'Boyle will talk about PCI DSS (Payment Card Industry - Data Security Standard), the set of compliance guidelines that you must adhere to if you store, transmit or process credit card information. This will be followed up with Barry Mulcahy's valuable information on management of identity and access to data across systems. Also, thanks to the kind sponsorship from Espion on the night there will be some food and drinks provided too. No doubt, this should be a great night :) Talk #1 - PCI DSS v3.1 Scanning and Penetration Testing Stephen will discuss the key changes in PCI DSS Version 3.1, examine penetration testing methodology from the auditor’s point of view, and how you can maintain compliance. Key Takeaways will include ∙ PCI DSS Pentest / Scanning overview ∙ Migrating from V2 to V3.1 ∙ Changes to penetration testing requirement 11.3 ∙ Scanning vs pen testing ∙ What the auditor expects from pen testing ∙ Example methodology Speaker Bio: Stephen O'Boyle Stephen heads up Espion’s Professional Services team and has been a PCI Qualified Security Assessor since 2008. He is an experienced information security, risk and compliance consultant with has over ten years’ experience in information security in both domestic and international markets. Stephen has extensive experience in performing PCI audits / consultancy, information security & risk management assessments, network / architecture security reviews, application security reviews, penetration testing and assisting organisations in aligning their information security posture to their business objectives. Stephen has worked across a wide range of industry verticals, including government, financial, education and technology. Talk #2 - Identity and Access Management (IAM) This talk will focus on Identity and Access Management (IAM), what it is and how it fits into the security landscape. It will outline the lifecycle of an identity (Hello new hire Alice!). How we move from having an identity to having access. Some of the common pitfalls encountered during IAM integration projects. Analytics techniques for IAM that smooth the integration path, validate controls and provide valuable Business Intelligence (BI) that are useful for process improvement and security auditing. The talk will conclude by looking at some of the recent trends in IAM and some pointers for the future. Speaker Bio: Barry P. Mulcahy Barry received a B.Sc. in computer science from UCC in 2001 and a Ph.D. in distributed security systems from UCC in 2008. His academic experience involves R&D in distributed security systems with an emphasis on data aggregation, analytics and workflows. While working in Waterford IT as a security researcher he was involved in several large European FP7 projects including CoMiFin, EternalS and Aniketos. His commercial roles include Identity and Access Management (IAM) Project Manager at Onaware-Mycroft. This boutique IAM integration house catered primarily for financial institutions. Barry is currently part of the Qualcomm Web Authentication team, helping design and implement security controls for authentication and authorization in Qualcomm’s global IT infrastructure. https://ie.linkedin.com/in/barrymulcahy Afterwards ... We might have a few sneaky pints afterwards, and you are all welcome to join us. We are having the talks in Cashman's Bar on Academy Street so we will stay on there. |
Top 10 Workshop #5 (Broken Auth & Session Mgmt, Security Misconfiguration and Sensitive Data Exposure) - 15 Oct 2015
OWASP Top 10 Workshop #5 (Broken Auth & Session Mgmt, Security Misconfiguration and Sensitive Data Exposure) | |
When | Where |
THursday 15th Oct 2015 Doors: 19:00 Talks start: 19:10 |
Venue Location: UCC, Western Gateway Building, Room G08 Venue Address: Western Road, Cork |
SLIDES FOR THIS MONTH | |
DESCRIPTION | |
Topics: - A5 Security Misconfiguration - A2 Broken Authentication and Session Management - A6 Sensitive Data Exposure Hi all, On Thursday, October 15th, we are holding the last of our free series of workshops based on OWASP's most well known flagship project, the OWASP Top 10 (2013) https://www.owasp.org/index.php/Top10. The goal of these workshops is to learn by doing, which is usually the best approach to learning anything. In that light, we will speak a little about each of the areas from the Top 10, then take that learning to the next level by attacking vulnerable sites and investigating vulnerable code and configurations. Note: During the previous workshops we set up our machines to be ready for web penetration testing. Anyone who has done this can continue as such, but if you have not, no problem, we can help you set up the one or two main tools that we will need for that night. That should only take a couple of minutes. If you would like some assistance in getting set-up then we will be there from 18:45 to help. Alternatively, you can contact one of the organisers (Fiona or Darren) in advance and we will let you know what you need. If you would like to have ZAP installed on your machine you can get it here: ZAP Install. Having a machine isn't a requirement for attending, there will be talks and demos as well as the practical elements. This month's workshop will be divided into three phases: 1. Top 10 2013 - A5 - Security Misconfiguration Delivered by: Fiona Collins Security misconfiguration can happen at any level of an application stack, including the platform, web server, application server, database, framework, and custom code. Developers and system administrators need to work together to ensure that the entire stack is configured properly. Automated scanners are useful for detecting missing patches, misconfigurations, use of default accounts, unnecessary services, etc., however these should not be relied upon. https://www.owasp.org/index.php/Top_10_2013-A5-Security_Misconfiguration 2. Top 10 2013 - A2 - Broken Authentication and Session Management Delivered by: Darren Fitzpatrick Developers frequently build custom authentication and session management schemes, but building these correctly is hard. As a result, these custom schemes frequently have flaws in areas such as logout, password management, timeouts, remember me, secret question, account update, etc. Finding such flaws can sometimes be difficult, as each implementation is unique. https://www.owasp.org/index.php/Top_10_2013-A2-Broken_Authentication_and_Session_Management 3. Top 10 2013 - A6 - Sensitive Data Exposure Delivered by: Fiona Collins The most common flaw is simply not encrypting sensitive data. When crypto is employed, weak key generation and management, and weak algorithm usage is common, particularly weak password hashing techniques. Browser weaknesses are very common and easy to detect, but hard to exploit on a large scale. External attackers have difficulty detecting server side flaws due to limited access and they are also usually hard to exploit. https://www.owasp.org/index.php/Top_10_2013-A6-Sensitive_Data_Exposure 4. Practical Hands On Workshop This section of the night will invoke our learning from the first phase and put it to practical use. We take our testing environment and use it to exploit some of both types of vulnerabilities on a safe, intentionally vulnerable website. After giving some time for individually attempting to carry out the exploitation, a walk-through of the exploit technique will be given for each of the examples outlined. The OWASP team will be at hand to help with any issues that might arise through this phase. The practical elements will allow you attack a vulnerable site from a malicious attacker or software tester's perspective. You will leave with not only an understanding of the issues but also having had hands on practice. Chapter meetings are provided free of charge although OWASP membership is encouraged and besides supporting the organisation, will provide the holder with benefits in other areas such as free/discounted entry to conferences, etc. Hope to see you there! Darren & Fiona (OWASP Cork Team) |
Top 10 Workshop #4 (XSS & Unvalidated Redirects and Forwards) - 10 Sept 2015
OWASP Top 10 Workshop #4 (XSS & Unvalidated Redirects and Forwards) | |
When | Where |
Thursday 10th Sept 2015 Doors: 19:00 Talks start: 19:10 |
Venue Location: UCC, Western Gateway Building, Room G09 Venue Address: Western Road, Cork |
SLIDES FOR THIS MONTH | |
A3 - Cross Site Scripting (XSS) & A10 - Unvalidated Redirects and Forwards | |
DESCRIPTION | |
Detecting and Preventing XSS, the Most Common Web App Security Flaw. On Thursday, September 10th, we are having the fourth of our free series of workshops based on OWASP's most well known flagship project, the OWASP Top 10 (2013) https://www.owasp.org/index.php/Top10. The goal of these workshops is to learn by doing, which is usually the best approach to learning anything. In that light, we will speak a little about each of the areas from the Top 10, then take that learning to the next level by attacking vulnerable sites and investigating vulnerable code and configurations. This month our guest speaker, Damilare Fagbemi, will mainly be investigating Cross Site Scripting (XSS) which claims the third highest spot (A3) in the top 10 and will also touch on A10 - Unvalidated Redirects and Forwards. Damilare is a software engineer and information security professional with expertise in Software Security and Data Analytics. He is a software security engineer in the Partner team at Intel Security Group where is responsible for developing strategies to improve security in the software development process while ensuring that software products built and shipped for Intel Security's partners are secure. Note: During the previous workshops we set up our machines to be ready for web penetration testing. Anyone who has done this can continue as such, but if you have not, no problem, we can help you set up the one or two main tools that we will need for that night. That should only take a couple of minutes. If you would like some assistance in getting set-up then we will be there from 18:45 to help. Alternatively, you can contact one of the organisers (Fiona or Darren) in advance and we will let you know what you need. If you would like to have ZAP installed on your machine you can get it here: ZAP Install. Having a machine isn't a requirement for attending, there will be talks and demos as well as the practical elements. This month's workshop will be divided into three phases: 1. Top 10 2013 - A3 - Cross Site Scripting (XSS) This important vulnerability can result in your application allowing arbitrary code to be run in the unsuspecting browsers of your users, putting those users at risk. We will discuss how to identify XSS vulnerabilities in your application, highlight the risks associated with injection flaws, provide some mitigation techniques and demonstrate how this all works. https://www.owasp.org/index.php/Top_10_2013-A3-Cross-Site_Scripting_(XSS) 2. Top 10 2013 - A10 - Unvalidated Redirects and Forwards An open redirect is a parameter which is accepted and used by the application to redirect a user to a URL of their choosing without any validation. This vulnerability is often used to facilitate phishing attacks. We will discuss how to identify these vulnerabilities in your application, highlight the associated risks , provide some mitigation techniques and demonstrate how this all works. https://www.owasp.org/index.php/Top_10_2013-A10-Unvalidated_Redirects_and_Forwards 3. Practical Hands On Workshop This section of the night will invoke our learning from the first phase and put it to practical use. We take our testing environment and use it to exploit some of both types of vulnerabilities on a safe, intentionally vulnerable website. After giving some time for individually attempting to carry out the exploitation, a walk-through of the exploit technique will be given for each of the examples outlined. The OWASP team will be at hand to help with any issues that might arise through this phase. The practical elements will allow you attack a vulnerable site from a malicious attacker or software tester's perspective. You will leave with not only an understanding of the issues but also having had hands on practice. Chapter meetings are provided free of charge although OWASP membership is encouraged and besides supporting the organisation, will provide the holder with benefits in other areas such as free/discounted entry to conferences, etc. |
Top 10 Workshop #3 (Injection) - 28 July 2015
OWASP Top 10 Workshop #3 (Injection) | |
When | Where |
Tuesday 28 July 2015 Doors: 19:00 Talks start: 19:10 |
Venue Location: UCC, Western Gateway Building, Room G09 Venue Address: Western Road, Cork |
SLIDES FOR THIS MONTH | |
DESCRIPTION | |
Tuesday July 28 will see the third of our free series of workshops based on OWASP's most well known flagship project, the OWASP Top 10 (2013) https://www.owasp.org/index.php/Top10. The goal of these workshops is to learn by doing, which is usually the best approach to learning anything. In that light, we will speak a little about each of the areas from the Top 10, then take that learning to the next level by attacking vulnerable sites and investigating vulnerable code and configurations. We will also be having our summer social event, with some free food and beer, after the talks - see below for more details. This month we will be looking at Injection flaws which are #1 in the top 10. This is the top item as successful exploitation can lead to complete control of your systems by a malicious user. Note: During the previous workshops we set up our machines. Anyone who has set up their machines during the last workshop can continue to use that and will have all tools in place, but if you have not, no problem, we can just set up the one or two main tools that we will need for that night. If you would like some assistance in getting set-up then we will be there from 18:45 to help. Alternatively, you can contact one of the organisers (Fiona or Darren) in advance and we will let you know what you need. If you would like to have ZAP installed on your machine you can get it here: ZAP Install. Having a machine isn't a requirement for attending, there will be talks and demos as well as the practical elements. This month's workshop will be divided into two phases with a networking event after the talks: 1. Top 10 2013 - A1 - Injection Fiona Collins Injection flaws, such as SQL, OS, and LDAP injection occur when untrusted data is sent to an interpreter as part of a command or query. The attacker’s hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization. The result of this being that an attacker can by-pass any application level controls in place and gain full remote control of the application or database server which can in turn be used to access other systems on your network. We will discuss how to identify injection vulnerabilities in your application, highlight the risks associated with injection flaws, provide some mitigation techniques and demonstrate how this all works. https://www.owasp.org/index.php/Top_10_2013-A1-Injection 2. Practical Hands On Workshop This section of the night will invoke our learning from the first phase and put it to practical use. We take our testing environment and use it to exploit some injection vulnerabilities on a safe, intentionally vulnerable website. After giving some time for individually attempting to carry out the exploitation, a walk-through of the exploit technique will be given for each of the examples outlined. The OWASP team will be at hand to help with any issues that might arise through this phase. The practical elements will allow you attack a vulnerable site from a malicious attacker or software tester's perspective. You will leave with not only an understanding of the issues but also having had hands on practice. 3. Summer Networking Event After the workshop we will go along to the Woolshed bar where we would like to treat you to some food, drinks and chats: (http://www.woolshedbaa.com/cork/) Chapter meetings are provided free of charge although OWASP membership is encouraged and besides supporting the organisation, will provide the holder with benefits in other areas such as free/discounted entry to conferences, etc. |
Top 10 Workshop #2 (CSRF & Insecure Components) - 25 June 2015
OWASP Top 10 Workshop #2 (CSRF & Insecure Components) | |
When | Where |
Thursday 25 June 2015 Doors: 19:00 Talks start: 19:10 |
Venue Location: UCC, Western Gateway Building, Room G09 Venue Address: Western Road, Cork |
SLIDES FOR THIS MONTH | |
DESCRIPTION | |
Thursday 25 June will see the second of our free series of workshops based on OWASP's most well known flagship project, the OWASP Top 10 (2013) https://www.owasp.org/index.php/Top10. The goal of these workshops is to learn by doing, which is usually the best approach to learning anything. In that light, we will speak a little about each of the areas from the Top 10, then take that learning to the next level by attacking vulnerable sites and investigating vulnerable code and configurations. Note: During the previous workshop we set up our machines. Anyone who has set up their machines during the last workshop can continue to use that and will have all tools in place, but if you have not, no problem, we can just set up the one or two main tools that we will need for that night. If would like some assistance in getting set-up then we will be there from 18:45 to help. Alternatively, you can contact one of the organisers (Fiona or Darren) in advance and we will let you know what you need. Having a machine isn't a requirement for attending, there will be talks and demos as well as the practical elements. This month's workshop will be divided into two phases: 1. Top 10 2013 - A8 - Cross-Site Request Forgery (CSRF) Vincent Ryan A CSRF attack forces a logged-on victim’s browser to send a forged HTTP request, including the victim’s session cookie and any other automatically included authentication information, to a vulnerable web application. This allows the attacker to force the victim’s browser to generate requests the vulnerable application thinks are legitimate requests from the victim. We will discuss what this issue is, a number of varieties of this issue along with methods for avoiding it in your application code and a demo of how you would examine a defence using burp. https://www.owasp.org/index.php/Top_10_2013-A8-Cross-Site_Request_Forgery_(CSRF) 2. Top 10 2013 - A9 - Using Components with Known Vulnerabilities Darren Fitzpatrick Components, such as libraries, frameworks, and other software modules, almost always run with full privileges. If a vulnerable component is exploited, such an attack can facilitate serious data loss or server takeover. Applications using components with known vulnerabilities may undermine application defenses and enable a range of possible attacks and impacts. We will discuss how know vulnerabilities can be identified in a system and used to get access to other systems and data in your network. Mitigation techniques will also be discussed. https://www.owasp.org/index.php/Top_10_2013-A9-Using_Components_with_Known_Vulnerabilities 3. Practical Hands On Workshop This section of the night will invoke our learning from the first phase and put it to practical use. We take our testing environment and use it to exploit some CSRF & component vulnerabilities on a safe, intentionally vulnerable website. After giving some time for individually attempting to carry out the exploitation, a walk-through of the exploit technique will be given for each of the examples outlined. The OWASP team will be at hand to help with any issues that might arise through this phase. |
Top 10 Workshop #1 (Test Environment Setup & Direct Object Reference) - 28 May 2015
OWASP Top 10 Workshop #1 (Test Environment Setup & Direct Object Reference) | |
When | Where |
Thursday 28 May 2015 Doors: 19:00 Talks start: 19:10 |
Venue Location: UCC, Western Gateway Building, Room G09 Venue Address: Western Road, Cork |
SLIDES FOR THIS MONTH | |
Setting Up a Hacking Environment | |
DESCRIPTION | |
Thursday 28 May will see the first of our free series of workshops based on OWASP's most well known flagship project, the OWASP Top 10 (2013) https://www.owasp.org/index.php/Top10. The goal of these workshops is to learn by doing, which is usually the best approach to learning anything. In that light, we will speak a little about each of the areas from the Top 10, then take that learning to the next level by attacking vulnerable sites and investigating vulnerable code and configurations. Note: To get the most out of these workshops, it would be best to bring your own laptop. This should have >1 GB of RAM, >5 GB of free storage and a reasonably fast processor. Failing these laptop requirements we could probably work around it, but this would be best for following the standard approach that will be taken by most. This month's workshop will be divided into three phases: 1. Setting Up Your Test Environment To start the night we will define test environments at a high level and then help you to configure VirtualBox with a hacking / penetration testing specific virtual machine, namely Kali Linux. Kali will provide a tailored, pre-configured environment for testing and comes pre-populated with a vast array of tools for all your hacking needs! If you just bring your laptop, we will have the files ready for you to install, or if you are a paranoid security person ;) you can download in advance from here: https://www.virtualbox.org/wiki/Downloads https://www.kali.org/downloads/ (32 bit iso) 2. Top 10 2013 - A4 - Insecure Direct Object References Insecure direct object reference occurs when a web application allows the user to choose the target data for their transaction without correctly restricting to the data to which they should be privy. In a secure configuration, the target data for retrieval would be based on the particular user session, however often the data retrieval decisions are based on parameters which the user can access. E.g. you access your on-line bank account details, but manipulate the incorrectly implemented request to have the application think that you are another user, and return that other user's details. We will discuss a number of varieties of this issue along with methods for avoiding it in your application code. https://www.owasp.org/index.php/Top_10_2013-A4-Insecure_Direct_Object_References 3. Practical Hands On Workshop This section of the night will invoke our learning from the first two phases and put it to practical use. We take our new testing environment and use it to exploit some direct object reference vulnerabilities on a safe, intentionally vulnerable website. After giving some time for individually attempting to carry out the exploitation, a walk-through of the exploit technique will be given for each of the examples outlined. The OWASP team will be at hand to help with any issues that might arise through this phase. Practical elements will cover the following two perspectives so that you leave with not only an understanding of the issues but also having had hands on practice in these areas: 1. Defensive - Seeing vulnerable code / configurations and investigating how the issues could be rectified. 2. Offensive - Attacking vulnerable sites from a malicious attacker or software tester's perspective. |
Cork Security Event - Mach 24
Amalgamating IT Security Best Practices Within an Organisation | |
On March 24th we held a joing security event with CorkSec, ISACA, and (ISC)2.
Slides from the talks are available here:
|
Chapter Meetings - 2014
Details and registration for all chapter meetingsis available on our Meet-Up page: http://www.meetup.com/OWASP-Cork/
OWASP December Event
Chapter Meeting - December 11 2014 | |
When | Where |
Thursday 11 December 2014 Doors: 19:00 Talks start: 19:15 |
Venue Location: UCC, Western Gateway Building, Room G04 Venue Address: Western Road, Cork |
DESCRIPTION | |
The next OWASP Cork Chapter meeting is taking place on Thursday December 11th in UCC (Western Gateway Building, WGB G04) at 7PM. Hope to see you there. There are two talks lined up: Talk 1: Eoin Carroll - Android Webview Exploitation Bio: Eoin Carroll is an IT Security Engineer and member of OWASP since 2009. Based in Cork and works on all things security with keen interests in the Android Stack, Threat Modeling, HTML5, Cryptanalysis, Reversing and Exploitation. Eoin has 13 years’ experience spanning across the IT, Semi-Conductor and Medical Device industries, working as an Electronic Engineer for 10 yrs and in Security for the last 3 years. Android Webview Exploitation This talk will focus on the AddJavascriptInterface which is remotely exploitable leading to Shell and Cross Application Scripting (XAS). Eoin will discuss the importance of Threat Modeling with cross platform development frameworks such as Phonegap/Cordova as well as security tools such as Drozer and AFE (Android Exploitation Framework). The session will finish with a MITM demo exploiting the AddJavascriptInterface. Slides are available here: OWASP Android Webview Explotiation
Talk 2: Eoin Keary & Rahim Jina - 2014 EdgeScan Vulnerability Stats Report Eoin Keary - BCC Risk Advisory / OWASP Eoin is international board member and vice chair of OWASP, The Open Web Application Security Project (owasp.org), and during his time in OWASP he has lead the OWASP Testing and Security Code Review Guides and also contributed to OWASP SAMM, and the OWASP Cheat Sheet Series. Eoin is a well-known technical leader in industry in the area of software security and penetration testing, and has led global security engagements for some of the world's largest financial services and consumer products companies. He was a senior manager, responsible for penetration testing in EMEA for a “big 4” professional services firm for 4.5 years. He is the CTO and founder of BCC Risk Advisory Ltd (bccriskadvisory.com) an Irish company who specialise in secure application development, advisory, penetration testing, Mobile & Cloud security and training. Eoin has delivered security training and talks for OWASP to over 600 developers in the past year including events such as RSA (2013), RSA Europe, OWASP EU (2013), OWASP Dublin 2013. Rahim Jina - BCC Risk Advisory / OWASP Rahim is a member of OWASP and has contributed to many open source security projects over the past 8 years such as the OWASP Testing and Security Code Review Guides and also OWASP SAMM. Previously Rahim was a senior consultant at a “big 4” professional services for and the head of security for a large VoIP/IPT company in Los Angeles, USA and now works as the Director of information security for BCC Risk Advisory (bccriskadvisory.com). His is also responsible for the security architecture of the edgescan.com vulnerability management solution.
|
OWASP September 22nd Event
Chapter Meeting - September 22 2014 | |
When | Where |
Monday 22nd September Doors: 19:00 Talks start: 19:15 |
Venue Location: UCC (WGB G.14) Venue Address: Western Gateway Building, UCC, Western Rd, Cork, Ireland |
DESCRIPTION | |
The next OWASP Cork Chapter meeting is taking place on Monday September 22nd in UCC (WGB G.14) at 7PM. We would like to treat all attendees to some beer and pizza after the talks in the Woolshed bar (Mardyke - http://www.woolshedbaa.com/cork/) Hope to see you there. There are two talks lined up: Talk 1: Introduction to OWASP ZAP Overview of the OWASP ZAP tool. The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.
Talk 2: Mark Denihan - OWASP Security Shepherd The OWASP Security Shepherd project has been designed and implemented with the aim of fostering and improving security awareness among a varied skill set demographic. Shepherd covers the OWASP Top Ten web app risks and has recently been injected with totally new content to cover the OWASP Top Ten Mobile risks as well. Many of these levels include insufficient mitigations and protections to these risks, such as blacklist filters, atrocious encoding schemes, barbaric security mechanisms and poor security configuration. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well. In this presentation we're going to look at the Shepherd platform itself from both a learning and teaching perspective. Some of Shepherd's lessons and challenges will be demonstrated and we'll also walkthrough how easy it is to stand up a Security Shepherd instance and how it can be tailored to suit any web/mobile app sec teaching environments.
|
OWASP September 2nd Event - Joint Event with CorkSec
Chapter Meeting - Joint event with CorkSec | |
When | Where |
Tuesday 2nd September Doors: 19:00 Talks start: 19:15 |
Venue Location: SoHo Venue Address: Grand Parade, Cork, Ireland |
DESCRIPTION | |
The first OWASP Cork Chapter meeting is taking place on Tuesday September 1st upstairs in SoHo bar on Grand Parade. This meeting is a joint event with the CorkSec group (http://www.meetup.com/CorkSec/). We would love if you could stay around after for a chat and some networking. There are two talks lined up: Talk 1: Web to Shell by Darren Fitzpatrick Darren will introduce the concept of getting a shell through a website. This basically means remotely taking over the server on which a web application is installed. After a little theory, he will go about delivering demonstrations of this in action. Demos will include common attack vectors of this type and one recent and quite common ruby on rails specific remote exploit.
In this short talk I'll be covering:
|
Everyone is welcome to join us at our chapter meetings.
Other OWASP Chapters in Ireland
OWASP Dublin
https://www.owasp.org/index.php/Ireland-Dublin
- Chapter Lead Owen Pendlebury +353876605277
- Board Member/Global Board Member Eoin Keary
- Board Member Fabio Cerullo +353877817468
- Board Member Mark Denihan
OWASP Limerick
https://www.owasp.org/index.php/Limerick
- Chapter Lead Marian Ventuneac