This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "2010 BASC Presentations"
Tom Conner (talk | contribs) |
Tom Conner (talk | contribs) |
||
Line 14: | Line 14: | ||
As defenses have become more sophisticated, so have the attacks required to circumvent them. Learn about the roots of techniques like Stack cookies/Stackguard/Run-Time Stack Checking, DEP and ASLR, from attacks like trampolining, | As defenses have become more sophisticated, so have the attacks required to circumvent them. Learn about the roots of techniques like Stack cookies/Stackguard/Run-Time Stack Checking, DEP and ASLR, from attacks like trampolining, | ||
return-oriented programming, the evolution of fuzzing techniques, static and dynamic analysis for attacking and defending software. | return-oriented programming, the evolution of fuzzing techniques, static and dynamic analysis for attacking and defending software. | ||
− | {{2010_BASC:Presentaton_Info_Template| | + | {{2010_BASC:Presentaton_Info_Template|OWASP Basics 1 and 2|Robert Cheyne|10|2}} |
Rob presents a number of scenarios that walk participants through the basics of SQL injection, XSS and CSRF, along with a few other tricks he has up his sleeve. Participants will come away with a foundation for further security learning. Those already knowledgeable on application security issues will learn some new techniques for presenting and teaching this information in a clear, concise and effective manner. | Rob presents a number of scenarios that walk participants through the basics of SQL injection, XSS and CSRF, along with a few other tricks he has up his sleeve. Participants will come away with a foundation for further security learning. Those already knowledgeable on application security issues will learn some new techniques for presenting and teaching this information in a clear, concise and effective manner. | ||
{{2010_BASC:Presentaton_Info_Template|Another TBD Presentation|To Be Determined|11|2}} | {{2010_BASC:Presentaton_Info_Template|Another TBD Presentation|To Be Determined|11|2}} |
Revision as of 17:16, 15 November 2010
We kindly thank our sponsors for their support. Please help us keep future BASCs free by viewing and visiting all of our sponsors.
- 1 Presentations
- 1.1 HTML5 Security
- 1.2 A Crumple Zone for Service Oriented Architectures
- 1.3 Hacking SAP BusinessObjects
- 1.4 Business Logic Attacks - BATs and BLBs
- 1.5 The Exploit Arms Race
- 1.6 OWASP Basics 1 and 2
- 1.7 Another TBD Presentation
- 1.8 Another TBD Presentation
- 1.9 Another TBD Presentation
- 1.10 Another TBD Presentation
- 1.11 Another TBD Presentation
Presentations
We would like to thank our speakers for donating their time and effort to help make this conference successful and free.
HTML5 Security
The power of HTML5 allows developers to create web applications not just structured content, but its new features has increased the attack surface. This presentation will demo and discuss new attack opportunities, particularly on client machines, including abusing the offline application cache and SQL injection via file-based client-side databases.
A Crumple Zone for Service Oriented Architectures
We present a new architectural construct analogous to the crumple zone in an automobile. It consists of a layer of intelligent service proxies that work together to provide both signature-based and non-signature based defenses. We present our initial design for Java RMI based services and compare it with web application firewalls.
Hacking SAP BusinessObjects
BusinessObjects is a very widely deployed business intelligence tool. In this presentation we will present the entire lifecycle of attacking a BusinessObjects server using vulnerabilities that we have found during our research.
Business Logic Attacks - BATs and BLBs
Business logic attacks are a set of legal application transactions that are used to carry out a malicious operation that is not part of normal business practices. This presentation will provide a quick introduction to business logic attacks, their unique characteristics and the motivation behind their uptick. . Concluding this session we will discuss using multiple advanced techniques to battle these attacks, rather than relying exclusively on application code
The Exploit Arms Race
As defenses have become more sophisticated, so have the attacks required to circumvent them. Learn about the roots of techniques like Stack cookies/Stackguard/Run-Time Stack Checking, DEP and ASLR, from attacks like trampolining, return-oriented programming, the evolution of fuzzing techniques, static and dynamic analysis for attacking and defending software.
OWASP Basics 1 and 2
Rob presents a number of scenarios that walk participants through the basics of SQL injection, XSS and CSRF, along with a few other tricks he has up his sleeve. Participants will come away with a foundation for further security learning. Those already knowledgeable on application security issues will learn some new techniques for presenting and teaching this information in a clear, concise and effective manner.
Another TBD Presentation
abstr
Another TBD Presentation
abstr
Another TBD Presentation
abst
Another TBD Presentation
abstr
Another TBD Presentation
abstr
We kindly thank our sponsors for their support.
Please help us keep future BASCs free by viewing and visiting all of our sponsors.
Gold Sponsors | |||