This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Netherlands

From OWASP
Revision as of 19:45, 5 October 2010 by Favroom (talk | contribs) (Chapter Sponsoring)

Jump to: navigation, search

OWASP Netherlands

Welcome to the Netherlands chapter homepage.


Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter. Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG



Local News

OWASP BeNeLux Day 2010 is comming up

The OWASP BeNeLux Day 2010 will take place 1st and 2nd of December at the Fontys Hogeschool, Eindhoven!
Mark the date in you agenda!

  • December 1st: OWASP Training Day
  • December 2nd: OWASP Conference

See:http://www.owasp.org/index.php/BeNeLux_OWASP_Day_2010


Chapter Meeting September 23rd 2010

Want to find out how Samy met your girlfriend? Come to our next chaptermeeting on the 23rd of september in Rotterdam, The Netherlands!

How I Met Your Girlfriend: The discovery and execution of entirely new classes of Web attacks in order to meet your girlfriend.

This includes entertaining and newly discovered attacks including PHP session prediction and random numbers (accurately guessing PHP session cookies), browser protocol confusion (turning a browser into an SMTP server), firewall and NAT penetration via Javascript (turning your router against you), extracting extremely accurate geolocation information from a Web browser (not using IP geolocation), and more.

Speaker Bio

Samy Kamkar is best known for the Samy worm, the first XSS worm, infecting over one million users on MySpace in less than 24 hours. A co-founder of Fonality, Inc., an IP PBX company, Samy previously led the development of top-level domain name server software and systems for Global Domains International (.ws).

In the past 10 years, Samy has focused on evolutionary and genetic algorithmic software development, Voice over IP software development, automated security and vulnerability research in network security, reverse engineering, and network gaming. When not strapped behind the Matrix, Samy can be found stunt driving and getting involved in local community service projects.

Meeting details Location: Weena 505, Rotterdam, The Netherlands Time: 19:00 - 21:00 Registration: send an email to netherlands (at) owasp (dot) org


Workshop Google Hacking

We have a special OWASP meeting around HITB!

Christian Heinrich, from OWASP Australia and project lead of the OWASP Google Hacking project. Chirstian is speaking at the HITB conference. He is willing to give a Google Hacks and Skipfish workshop:

Please see tab "Chapter Meetings" for more details. This will take place june 30th:

Location: Sogeti Netherland Wildenborch 3 1112 xb Diemen

HITB 2010 Amsterdam

The FIRST EVER HITBSecConf in Europe, HITBSecConf 2010 - Amsterdam takes place at the NH Grand Krasnapolsky from the 29th of June till the 2nd of July with a QUAD TRACK line up!

OWASP members get a special offer:
OWASP MEMBERS SAVE EUR200 OFF THE CONFERENCE PRICE!!!
EUR699 instead of EUR899.This offer is limited to the first 50 registrations.
OWASP members are encouraged to register as soon as possible to avoid disappointment.
Please supply your OWASP membership ID to the registration!

Conference Website: http://conference.hitb.org/hitbsecconf2010ams/
29th & 30th June - Hands on Technical Training Sessions

Chapter Meetings

2010 Schedule

  • March 11th, 18.00 - 21.30 Topic: Database Security
  • May 20th, 18.00 - 21.30 Topic: Web Application Firewalls
  • June 30th, 18:00 - 21:00 Workshop Google Hacks & Skipfish
  • September 23rd, 18.00 - 21.30 Topic: How Samy met your girlfriend
  • December 1st & 2nd, OWASP BeNeLux conference


REGISTRATION

To register for a chapter meeting (first register, first serve)! Please send an email to: netherlands 'at' owasp.org.

How Samy met your girlfriend

WHERE

Nationale- Nederlanden

Weena 501 - 505, 3013 AL Rotterdam

Owasp logo normal.jpg Logo Sogeti.jpg

Speaker and Sandwiches sponsored by OWASP

Drinks sponsored by Sogeti

PROGRAM

19:00 - 19:20 Check-In (catering included)
19:20 - 19:30 Opening (OWASP Netherlands Chapter)
19:30 - 20:30 Presentation: How Samy met your girlfriend by Samy Kamkar
20:30 - 21:00 Discussion

Bio

Samy Kamkar is best known for the Samy worm, the first XSS worm, infecting over one million users on MySpace in less than 24 hours. A co-founder of Fonality, Inc., an IP PBX company, Samy previously led the development of top-level domain name server software and systems for Global Domains International (.ws).

In the past 10 years, Samy has focused on evolutionary and genetic algorithmic software development, Voice over IP software development, automated security and vulnerability research in network security, reverse engineering, and network gaming. When not strapped behind the Matrix, Samy can be found stunt driving and getting involved in local community service projects.

How Samy met your girlfriend

How I Met Your Girlfriend: The discovery and execution of entirely new classes of Web attacks in order to meet your girlfriend.

This includes entertaining and newly discovered attacks including PHP session prediction and random numbers (accurately guessing PHP session cookies), browser protocol confusion (turning a browser into an SMTP server), firewall and NAT penetration via Javascript (turning your router against you), extracting extremely accurate geolocation information from a Web browser (not using IP geolocation), and more.

Links

Workshop Google Hacks & Skipfish (June 30th 2010)

WHERE

Sogeti Nederland B.V

Sogeti Netherland Wildenborch 3 1112 xb Diemen

Logo Sogeti.jpg



PROGRAM

18:00 - 18:30 Check-In (catering included)
18:30 - 18:45 Opening (OWASP organization, projects, sponsor)
18:45 - 19:00 Break
19:00 - 21:00 Workshop Google Hacking & Skipfish
21:00 - 21:30 Discussion, questions and social networking

Bios

Christian Heinrich is the Project Leader of the OWASP "Google Hacking" Project i.e. "Download Indexed Cache" and has contributed to the "Spiders/Robots/Crawlers" and "Search Engine Reconnaissance" sections of the OWASP Testing Guide v3 and more recently to the development of the OWASP Top Ten and Application Security Verification Standard (ASVS) OWASP Projects. He has presented at OWASP Conferences in USA, Australia and Europe and OWASP Chapters in London, UK and Sydney and Melbourne, Australia.

Google Hacking:

Google Hacks is a compilation of carefully crafted Google searches that expose novel functionality from Google's search and map services. For example, you can use it to view a timeline of your search results, view a map, search for music, search for books, and perform many other specific kinds of searches. You can also use this program to use google as a proxy.

Skipfish:

A fully automated, active web application security reconnaissance tool. Key features: High speed: pure C code, highly optimized HTTP handling, minimal CPU footprint - easily achieving 2000 requests per second with responsive targets. Ease of use: heuristics to support a variety of quirky web frameworks and mixed-technology sites, with automatic learning capabilities, on-the-fly wordlist creation, and form autocompletion. Cutting-edge security logic: high quality, low false positive, differential security checks, capable of spotting a range of subtle flaws, including blind injection vectors.

The relevant links:

Web Application Firewalls (May 20th 2010)

WHEN

May 2010 (18h00pm-21h30pm).

WHERE

Location: http://www.setuputrecht.nl/
SETUP is gevestigd aan het Neude plein in Utrecht (Neude 4) in het nieuwe kantoor van de Dutch Game Garden.
(entrance at the back of the ABNamro building on “het Neude”)
Lokatie setup google.gif

Setup logo.jpg

Itq logo.jpg



PROGRAM

18:00 - 18:30 Check-In (catering included)
18:30 - 18:45 Introduction (OWASP organization, projects, sponsor)
18.45 - 19.45 Web Application Firewalls in dynamic environments(by Alexander Meisel)
Alexander Meisel is the CTO of 'art of defence' (AOD), a German based software vendor. The company specializes in high performance deployments of Web Application Firewalls in very dynamic environments all over the world.

Abstract: The current trend towards cloud computing forces everybody to deploy services in a virtual environment. In current dedicated environments WAFs or Web Application Firewalls are mostly deployed as a hardware (black) box which is easy at first but limits them to only low performance web cluster architectures. Moving those systems virtualized into a cloud environment makes almost no sense because of the resource limitations. The is solution is a redesign which enables WAFs to be part of a true message based cloud system. This talk explains how truly virtualized and distributed web applications are architected, work and scale in high performance environments.
19.45 – 20.00 Break
20.00 - 21:00 Bypassing Web Application Firewalls (by Sandro Gauci)
Sandro Gauci is the owner and Founder of EnableSecurity (www.enablesecurity.com) where he performs R&D and security consultancy for mid-sized companies. Sandro has over 9 years experience in the security industry and is focused on analysis of security challenges and providing solutions to such threats. Hispassion is vulnerability research and has previously worked together with various endors such as Microsoft and Sun to fix security holes. Sandro is the author of the free VoIP security scanning suite SIPVicious (sipvicious.org) and VOIPPACK for CANVAS.

Abstract: WAFs or Web Application Firewalls are being deployed to fix security issues in your web applications. The question is, are they? In this presentation we take a look at some of the issues related to making use of this solution and how it may affect the overall security posture of your web application. Finally we will describe tools to automate detection of WAFs, and also tools to help identify ways to bypass WAFs. This presentation will include updates to the open source WAF security testing tools - WAFFIT.
(the slides in pdf format)
21.00 – 21:30 Discussion, questions and social networking

The Announcement of this meeting: Media:Announcement_OWASP-NL_May_20th_2010.pdf

Database Security (Mar-11-2010)

WHEN

Thurday, March 11th, 2010 (18h00pm-21h30pm).

WHERE

ASR Nederland

MD0.60 - Auditorium
Smallepad 30
3811MG Amersfoort

ASR Nederland logo.jpg




PROGRAM

18:00 - 18:30 Check-In (catering included)
18:30 - 18:45 Introduction (OWASP organization, projects, sponsor)
18.45 - 19.45 SQL Injection - How far does the rabbit hole go? (By Justin Clarke)
Justin Clarke is a co-founder and Director at Gotham Digital Science, based in the United Kingdom. He has over twelve years of experience in assessing the security of networks, web applications, and wireless networks for large financial, retail, technology and government clients in the United States, the United Kingdom and New Zealand. Justin is the the technical editor and lead author of “SQL Injection Attacks and Defense” (Syngress 2009), co-author of "Network Security Tools: Writing, Hacking, and Modifying Security Tools" (O’Reilly 2005), a contributing author to "Network Security Assessment: Know Your Network, 2nd Edition" (O’Reilly 2007), as well as a speaker at a number of conferences and events on security topics, including Black Hat USA, EuSecWest, OSCON, ISACA, RSA, SANS, OWASP, and the British Computer Society. He is the author of the open source SQLBrute blind SQL injection testing tool, and is the Chapter Leader for the London chapter of OWASP. SQl Injection - How far does the rabbit hole go? SQL Injection has been around for over 10 years, and yet it is still to this day not truly understood by many security professionals and developers. With the recent mass attacks against sites across the world it has again come to the fore of vulnerabilities under the spotlight, however many consider it to only be a data access issue, or parameterized queries to be a panacea.
This talk starts from what was demonstrated last year at Black Hat in Las Vegas, where a self propagating SQL Injection worm was demonstrated live on stage. Explore some of the deeper, darker areas of SQL Injection, hybrid attacks, and exploiting obscure database functionality
(the slides in pdf format)
19.45 – 20.00 Break
20. 00 – 20.30 VAC Insecure Direct Object Reference (By Marinus Kuivenhoven)
Marinus Kuivenhoven is a Senior Technology Specialist with Sogeti Nederland B.V. specializing in service oriented architectures and secure application development. His experience include developing and administrating Oracle-based systems. At Sogeti Nederland B.V. he is also an active member of the PaSS -Software(Proactive Security Strategy) taskforce focusing on secure application development. Marinus also developed and teaches several application security courses both within and outside Sogeti. In the past years he has written for magazine such as Computable and We Love IT. And he has spoken on a number of conferences and events like OWASP, Recent OO Trends, Open Source Developer Conference and Engineering World. Vulnerability: Insecure Direct Object Reference is when a web application exposes an internal implementation object to the user. Some examples of internal implementation objects are database records, URLs, or files.
Attack: An attacker can modify the internal implementation object in an attempt to abuse the access controls on this object. When the attacker does this they may have the ability to access functionality that the developer didn’t intend to expose access to.
Countermeasure: Reference should be validated for authorization and accessed through reference maps. How this should be done will be shown.
(the slides in pdf format)
20.30 – 21.15 Overlooked Resources and Practices (By Justin Clarke)
In his second presentation, Justin Clarke discussed OWASP resources and best practices by highlighting some OWASP projects and underused security practices. He shared his experiences in his daily work as well as the known pitfalls.
(the slides in pdf format)
21.15 – 21:30 Discussion, questions and social networking

The Announcement of this meeting: Media:Announcement_OWASP-NL_March_11th_2010.pdf
The flyer of this meeting: Media:Owasp_NL_march2010.pdf

Past Events

Call for Speakers

We are continuously looking for speakers.
Presentations: Are you working on an interesting subject, would you like to share your experience with the OWASP community and do you have presentation skills. Please let us know! Any topic related to web application security will be appreciated!
VAC, Vulnerability, Attack, Countermeasure: The VAC is a re occuring part of the chapter meetings. The VAC is a half hour in-depth technical presentation about a vulnerability, how it can be exploited and how to prevent it!

Links:

Speaker Agreement

Template

Interested in presenting at a local chapter meeting, please send an email to: netherlands 'at' owasp.org

Call for Location

For the OWASP Netherlands chapter meetings to come, we are continuously looking for locations!

Most preferable, the location is good accessible with public transport and by car. Free parking should be provided.

What do we expect:

  • meeting room for at least 50 people
  • lunch for attendees
    • drinks, sandwiches...
  • a small present for the speakers
    • (e.g. bottle of wine, for speakers from aboard alcohol might be less practical if flying in only with hand luggage)

Interested in sponsoring a local chapter meeting, please send an email to: netherlands 'at' owasp.org

Chapter Leaders

The Netherlands Chapter is supported by the following board:

Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects.

Chapter Sponsoring

OWASP Netherlands is looking for organizations to sponsor our chapter. If you are interested in sponsoring the Netherlands chapter please contact via email: netherlands 'at' owasp.org.


If you would like to donate to our chapter, please use the PayPal link below. Thank you!


<paypal>Netherlands</paypal>