This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "BeNeLux OWASP Day 2010"

From OWASP
Jump to: navigation, search
Line 1: Line 1:
 
__NOTOC__  
 
__NOTOC__  
<center>[[File:OWASP BeNeLux 2010.png]]<br></center>  
+
<center>[[Image:OWASP BeNeLux 2010.png]]<br></center>  
 
<br> <!-- Header -->  
 
<br> <!-- Header -->  
  
Line 7: Line 7:
 
<br>  
 
<br>  
 
<center>
 
<center>
===Confirmed Speakers:===
+
=== Confirmed Speakers: ===
 +
 
 
Eoin Keary (OWASP Board, E&amp;Y)<br> Sebastien Deleersnyder (OWASP Board, SAIT Zenitel)<br> Radu State (University of Luxembourg)<br> N Nikiforakis (Katholieke Universiteit Leuven)<br> Marco Balduzzi (Eurecom)<br> Walter Belgers (Madison Gurkha)<br> Thierry Zoller<br> ...  
 
Eoin Keary (OWASP Board, E&amp;Y)<br> Sebastien Deleersnyder (OWASP Board, SAIT Zenitel)<br> Radu State (University of Luxembourg)<br> N Nikiforakis (Katholieke Universiteit Leuven)<br> Marco Balduzzi (Eurecom)<br> Walter Belgers (Madison Gurkha)<br> Thierry Zoller<br> ...  
  
Line 18: Line 19:
 
==== Training, December 1st  ====
 
==== Training, December 1st  ====
  
{{Template:<includeonly>{{{1}}}</includeonly><noinclude>OWASP Training</noinclude>
+
{{Template:<img _fck_mw_includeonly="true" _fckrealelement="5" _fckfakelement="true" src="http://www.owasp.org/extensions/FCKeditor/fckeditor/editor/images/spacer.gif" class="FCK__MWIncludeonly"><img _fck_mw_noinclude="true" _fckrealelement="4" _fckfakelement="true" src="http://www.owasp.org/extensions/FCKeditor/fckeditor/editor/images/spacer.gif" class="FCK__MWNoinclude">
 
| Course_designation = OWASP Projects and Resources you can use TODAY!
 
| Course_designation = OWASP Projects and Resources you can use TODAY!
  
Line 111: Line 112:
  
  
}}
+
}}  
  
 +
<br>
  
 
==== Conference, December 2nd  ====
 
==== Conference, December 2nd  ====
Line 121: Line 123:
 
|-
 
|-
 
| style="background: none repeat scroll 0% 0% rgb(123, 138, 189); width: 15%; -moz-background-inline-policy: continuous;" | from - to  
 
| style="background: none repeat scroll 0% 0% rgb(123, 138, 189); width: 15%; -moz-background-inline-policy: continuous;" | from - to  
| align="left" style="background: none repeat scroll 0% 0% rgb(194, 194, 194); width: 75%; -moz-background-inline-policy: continuous;" colspan="2" | Registration
+
| align="left" colspan="2" style="background: none repeat scroll 0% 0% rgb(194, 194, 194); width: 75%; -moz-background-inline-policy: continuous;" | Registration
 
|-
 
|-
 
| style="background: none repeat scroll 0% 0% rgb(123, 138, 189); width: 15%; -moz-background-inline-policy: continuous;" | from - to  
 
| style="background: none repeat scroll 0% 0% rgb(123, 138, 189); width: 15%; -moz-background-inline-policy: continuous;" | from - to  
| align="left" style="background: none repeat scroll 0% 0% rgb(242, 242, 242); width: 75%; -moz-background-inline-policy: continuous;" colspan="2" |  
+
| align="left" colspan="2" style="background: none repeat scroll 0% 0% rgb(242, 242, 242); width: 75%; -moz-background-inline-policy: continuous;" |  
 +
Agenda:
  
Agenda:
 
 
*'''Welcome and OWASP Update''' (by Eoin Keary, OWASP Board, E&amp;Y and Seba Deleersnyder, OWASP Board, SAIT Zenitel)  
 
*'''Welcome and OWASP Update''' (by Eoin Keary, OWASP Board, E&amp;Y and Seba Deleersnyder, OWASP Board, SAIT Zenitel)  
 
*'''0wning Networks with VoIP and Web attacks''' (by Radu State, University of Luxembourg)
 
*'''0wning Networks with VoIP and Web attacks''' (by Radu State, University of Luxembourg)
:Voice over IP is the current de facto technology for delivering voice data in both enterprise and service provider infrastructure. Although , security threats specific to VoIP signalling have been known for a while, few is known about cross-layer attacks in which Web enabled VoIP devices allow for efficient attacks against the VoIP infrastructure and general IT networks .
+
 
:This talk will give a short introduction to VoIP and continue with a series of attacks that leverage SIP as efficient transport vehicle for billing attacks , disclosure attacks and network penetration.     The talk will show how one single phone call can compromise even the best secured and hardened network perimeter .
+
:Voice over IP is the current de facto technology for delivering voice data in both enterprise and service provider infrastructure. Although , security threats specific to VoIP signalling have been known for a while, few is known about cross-layer attacks in which Web enabled VoIP devices allow for efficient attacks against the VoIP infrastructure and general IT networks .  
 +
:This talk will give a short introduction to VoIP and continue with a series of attacks that leverage SIP as efficient transport vehicle for billing attacks , disclosure attacks and network penetration. The talk will show how one single phone call can compromise even the best secured and hardened network perimeter .
 +
 
 
*'''Privacy of file sharing service''' (by N Nikiforakis, Katholieke Universiteit Leuven)
 
*'''Privacy of file sharing service''' (by N Nikiforakis, Katholieke Universiteit Leuven)
 +
 
:File sharing services are used daily by tens of thousands of people as a way of sharing files. Almost all such services, use a security-through-obscurity method of hiding the files of one user from others. For each uploaded file, the user is given a secret URL which supposedly cannot be guessed. The user can then share his uploaded file by sharing this URL with other users of his choice. Unfortunately though, a number of file sharing services are incorrectly implemented allowing an attacker to guess valid URLs of millions of files and thus allowing him to enumerate their file database and access all of the uploaded files. In this paper, we study some of these services and we record their incorrect implementations. We design automatic enumerators for two such services and a privacy-classifying module which characterises an uploaded file as private or public. Using this technique we gain access to thousands of private files ranging from private and company documents to personal photographs. We present a taxonomy of the private files found and ways that the users and services can protect themselves against such attacks.
 
:File sharing services are used daily by tens of thousands of people as a way of sharing files. Almost all such services, use a security-through-obscurity method of hiding the files of one user from others. For each uploaded file, the user is given a secret URL which supposedly cannot be guessed. The user can then share his uploaded file by sharing this URL with other users of his choice. Unfortunately though, a number of file sharing services are incorrectly implemented allowing an attacker to guess valid URLs of millions of files and thus allowing him to enumerate their file database and access all of the uploaded files. In this paper, we study some of these services and we record their incorrect implementations. We design automatic enumerators for two such services and a privacy-classifying module which characterises an uploaded file as private or public. Using this technique we gain access to thousands of private files ranging from private and company documents to personal photographs. We present a taxonomy of the private files found and ways that the users and services can protect themselves against such attacks.
*'''Clickjacking: an empirical study with an automated testing/detection system''' (by Marco Balduzzi, Eurecom)
+
 
:Clickjacking recently received new media attentions: Thousands of Facebook users have fallen victims of a worm that uses clickjacking techniques to propagate.
+
*'''Clickjacking: an empirical study with an automated testing/detection system''' (by Marco Balduzzi, Eurecom)
:In a clickjacking attack, a malicious page is constructed (or a benign page is hijacked) to trick the user into performing unintended clicks that are advantageous for the attacker, such as propagating a web worm, stealing confidential information or abusing of the user session.
+
 
:However it is currently unclear to what extent clickjacking is being used by attackers in the wild and how significant the attack is for the security of Internet users.
+
:Clickjacking recently received new media attentions: Thousands of Facebook users have fallen victims of a worm that uses clickjacking techniques to propagate.  
 +
:In a clickjacking attack, a malicious page is constructed (or a benign page is hijacked) to trick the user into performing unintended clicks that are advantageous for the attacker, such as propagating a web worm, stealing confidential information or abusing of the user session.  
 +
:However it is currently unclear to what extent clickjacking is being used by attackers in the wild and how significant the attack is for the security of Internet users.  
 
:In this talk, we presents a solution we designed for studying the prevalence of clickjacking on the Internet and for detecting possible malicious pages in an automated fashion. We deployed our system over 10 distinct virtual machines to test more then a million unique web-pages in two months. From the analysis of our experimental results we discuss the clickjacking phenomenon and its future implications.
 
:In this talk, we presents a solution we designed for studying the prevalence of clickjacking on the Internet and for detecting possible malicious pages in an automated fashion. We deployed our system over 10 distinct virtual machines to test more then a million unique web-pages in two months. From the analysis of our experimental results we discuss the clickjacking phenomenon and its future implications.
 +
 
*'''Attacking is easy, defending is hard''' (by Walter Belgers, Madison Gurkha)
 
*'''Attacking is easy, defending is hard''' (by Walter Belgers, Madison Gurkha)
:An attacker has an easy job. They need only find one security hole, and they've broken the system. The system, application and network administrators :have a much harder task. They have to find not just one, but each and every one of the holes. Preferably before the bad guys do.
+
 
:And, these holes can be at several different layers. In the presentation, we will look at those layers (system level, application level, but also user :level) and observe what goes wrong and how to fix it. The observations come from the daily work at Madison Gurkha.
+
:An attacker has an easy job. They need only find one security hole, and they've broken the system. The system, application and network administrators&nbsp;:have a much harder task. They have to find not just one, but each and every one of the holes. Preferably before the bad guys do.  
:Examples of problems are lack of patches, problems during the development phase, susceptibility to social engineering attacks and more.  
+
:And, these holes can be at several different layers. In the presentation, we will look at those layers (system level, application level, but also user&nbsp;:level) and observe what goes wrong and how to fix it. The observations come from the daily work at Madison Gurkha.  
*'''How not to design and implement a cash back system''' (by Thierry Zoller)
+
:Examples of problems are lack of patches, problems during the development phase, susceptibility to social engineering attacks and more.
*'''[[:Category:OWASP Code Review Project|The OWASP code review guide]]''' (by Eoin Keary, OWASP Board, E&amp;Y)
+
 
..
+
*'''How not to design and implement a cash back system''' (by Thierry Zoller)  
 +
*'''[[:Category:OWASP Code Review Project|The OWASP code review guide]]''' (by Eoin Keary, OWASP Board, E&amp;Y)  
 +
*'''The Social Networking Corporate Threat''' (by Chen Gour Arie, Comsec)
 +
 
 +
:Social Networking Sites (SNS) and Web 2.0 platforms have been growing rapidly over the past few years, with multi-millions utilizing these platforms on&nbsp;:a daily basis. In this talk, we will present some of the threats that SNS introduces to the corporate environment.
 +
 
 +
..
 +
 
 
|}
 
|}
 +
 
==== Speakers  ====
 
==== Speakers  ====
 +
 
{|
 
{|
 
|-
 
|-
|'''Eoin Keary (OWASP Board, E&Y)'''  
+
| '''Eoin Keary (OWASP Board, E&amp;Y)'''
 
|-
 
|-
|Chapter Lead and founder of OWASP Ireland chapter. Co-Author,Co - Editor and team lead of the OWASP Testing Guide.
+
| Chapter Lead and founder of OWASP Ireland chapter. Co-Author,Co - Editor and team lead of the OWASP Testing Guide.  
Co-Author, Editor/team lead of the OWASP Code Review guide.
+
Co-Author, Editor/team lead of the OWASP Code Review guide.  
 +
 
 
|}
 
|}
 +
 +
{|
 +
|-
 +
| '''Sebastien Deleersnyder (OWASP Board, SAIT Zenitel)'''
 +
|-
 +
| Sebastien started the successful Belgian OWASP Chapter and performed several public presentations on web application and web services security. Sebastien specialises in (web) application security, combining his software development and information security experience. He is currently OWASP Foundation board member and Managing Technical Consultant at SAIT Zenitel.
 +
|}
 +
 
{|
 
{|
 
|-
 
|-
|'''Sebastien Deleersnyder (OWASP Board, SAIT Zenitel)'''  
+
| '''Radu State (University of Luxembourg)'''
 
|-
 
|-
|Sebastien started the successful Belgian OWASP Chapter and performed several public presentations on web application and web services security. Sebastien specialises in (web) application security, combining his software development and information security experience. He is currently OWASP Foundation board member and Managing Technical Consultant at SAIT Zenitel.
+
| Radu received his PhD degree from INRIA, Nancy – University Henri Poincaré in 2001.<br>
 +
Radu has held positions as Research Engineer and Senior Engineer at INRIA-LORIA and has been working as Senior Researcher at the University of Luxembourg, FSTC-CSC Research Unit from October 2008 to September 2010. Radu's research activity will be on one side investigate interoperability aspects to supply security components in the area of ubiquitous computing and on the other side set up a project specific interoperability research lab in close cooperation with industry.  
 +
 
 
|}
 
|}
 +
 
{|
 
{|
 
|-
 
|-
|'''Radu State (University of Luxembourg)'''  
+
| '''Nick Nikiforakis (Katholieke Universiteit Leuven)'''
 
|-
 
|-
|Radu received his PhD degree from INRIA, Nancy – University Henri Poincaré in 2001.<br>
+
| Nick Nikiforakis is a PhD student at the Katholieke Universiteit Leuven, in Belgium. He belongs to the DistriNet research group and specifically in the “Security &amp; Languages” task-force. His current research interests are: low-level security for unsafe languages and web application security. <br>  
Radu has held positions as Research Engineer and Senior Engineer at INRIA-LORIA and has been working as Senior Researcher at the University of Luxembourg, FSTC-CSC Research Unit from October 2008 to September 2010. Radu's research activity will be on one side investigate interoperability aspects to supply security components in the area of ubiquitous computing and on the other side set up a project specific interoperability research lab in close cooperation with industry.
+
Nick holds a BSc in Computer Science and a MSc on Distributed Systems from the University of Crete in Greece. He worked for 3 years as a research assistant in the Distributed Computing Systems group at the Foundation of Research and Technology in Crete where he did research in network data visualization, authentication schemes using mobile devices and phishing countermeasures. In the past, Nick has presented his work in academic conferences as well as hacking conventions. His work can be found online at www.securitee.org.  
 +
 
 
|}
 
|}
 +
 
{|
 
{|
 
|-
 
|-
|'''Nick  Nikiforakis (Katholieke Universiteit Leuven)'''  
+
| '''Marco Balduzzi (Eurecom)'''
 
|-
 
|-
|Nick Nikiforakis is a PhD student at the Katholieke Universiteit Leuven, in Belgium. He belongs to the DistriNet research group and specifically in the “Security & Languages” task-force. His current research interests are: low-level security for unsafe languages and web application security. <br>
+
| Marco Balduzzi was born in Seriate (Italy) in 1982. He has studied Computer Engineering at the University of Bergamo where he has obtained his Master (Eng. Msc.) with a thesis titled «Security by virtualization: a novel antivirus for personal computers». During his graduation studies, in 2005 he has spent six months as exchange student at the University of Science and Technology of Trondheim (Norway), and the following year he has joined an IT-security company in Munich (Germany) to perform an internship oriented to the research of a new system architecture for computers defense. Marco is interested in Linux and Free-Software since the year 2000, when he co-founded the Bergamo's Linux User Group. Since 2004, he has worked as IT-security and networking specialist for several companies in Milan (Italy), Munich (Germany) and Sophia-Antipolis (France). In October 2008, he has joined EURECOM as Ph.D. student, where he works in the research group of Applied Security iSecLab under the supervision of Prof. Engin Kirda
Nick holds a BSc in Computer Science and a MSc on Distributed Systems from the University of Crete in Greece. He worked for 3 years as a research assistant in the Distributed Computing Systems group at the Foundation of Research and Technology in Crete where he did research in network data visualization, authentication schemes using mobile devices and phishing countermeasures. In the past, Nick has presented his work in academic conferences as well as hacking conventions. His work can be found online at www.securitee.org.
 
 
|}
 
|}
 +
 
{|
 
{|
 
|-
 
|-
|'''Marco Balduzzi (Eurecom)'''  
+
| '''Walter Belgers (Madison Gurkha) '''
 
|-
 
|-
|Marco Balduzzi was born in Seriate (Italy) in 1982. He has studied Computer Engineering at the University of Bergamo where he has obtained his Master (Eng. Msc.) with a thesis titled «Security by virtualization: a novel antivirus for personal computers». During his graduation studies, in 2005 he has spent six months as exchange student at the University of Science and Technology of Trondheim (Norway), and the following year he has joined an IT-security company in Munich (Germany) to perform an internship oriented to the research of a new system architecture for computers defense. Marco is interested in Linux and Free-Software since the year 2000, when he co-founded the Bergamo's Linux User Group. Since 2004, he has worked as IT-security and networking specialist for several companies in Milan (Italy), Munich (Germany) and Sophia-Antipolis (France). In October 2008, he has joined EURECOM as Ph.D. student, where he works in the research group of Applied Security iSecLab under the supervision of Prof. Engin Kirda
+
| Walter Belgers heeft Technische Informatica gestudeerd aan de Technische Universiteit Eindhoven met als extra vak o.a. Computercriminaliteit (Universiteit van Tilburg). Walter is in 1994 begonnen bij Philips C&amp;P (tegenwoordig Atos Origin) als ontwikkelaar van wereldwijde firewall-diensten en de uitrol daarvan. Daarna heeft hij enkele jaren lesgegeven op het gebied van UNIX en Internet beveiliging bij AT Computing. In 2002 is hij toegetreden tot Madison Gurkha als partner. Naast zijn technische consultancy-activiteiten, houdt Walter zich bezig met het schrijven van artikelen en columns, het geven van lezingen en voorlichten van de pers. Walter is gecertificeerd security professional (CISSP) en security auditor (CISA).
 
|}
 
|}
 +
 
{|
 
{|
 
|-
 
|-
|'''Walter Belgers (Madison Gurkha) '''  
+
| '''Martin Knobloch (Sogeti Nederland B.V.) '''
 
|-
 
|-
|Walter Belgers heeft Technische Informatica gestudeerd aan de Technische Universiteit Eindhoven met als extra vak o.a. Computercriminaliteit (Universiteit van Tilburg). Walter is in 1994 begonnen bij Philips C&P (tegenwoordig Atos Origin) als ontwikkelaar van wereldwijde firewall-diensten en de uitrol daarvan. Daarna heeft hij enkele jaren lesgegeven op het gebied van UNIX en Internet beveiliging bij AT Computing. In 2002 is hij toegetreden tot Madison Gurkha als partner. Naast zijn technische consultancy-activiteiten, houdt Walter zich bezig met het schrijven van artikelen en columns, het geven van lezingen en voorlichten van de pers. Walter is gecertificeerd security professional (CISSP) en security auditor (CISA).
+
| Martin Knobloch is employed at Sogeti Netherlands as Senior Security Consultant. He is founder and thought leader of the Sogeti task force PaSS, Proactive Security Strategy, with an integral solution of information security within organisation, infrastructure and software. <br>
 +
At OWASP, Martin is board member of the OWASP Netherlands Chapter and member of the Global Education Committee.  
 +
 
 
|}
 
|}
 
{|
 
{|
 
|-
 
|-
|'''Martin Knobloch (Sogeti Nederland B.V.) '''  
+
| '''Chen Gour Arie (Comsec) '''
 
|-
 
|-
|Martin Knobloch is employed at Sogeti Netherlands as Senior Security Consultant. He is founder and thought leader of the Sogeti task force PaSS, Proactive Security Strategy, with an integral solution of information security within organisation, infrastructure and software. <br>
+
|  
At OWASP, Martin is board member of the OWASP Netherlands Chapter and member of the Global Education Committee.
 
 
|}
 
|}
==== CTF  ====
+
 
During both days, a '''C'''apture '''T'''he '''F'''lag challenge will be online and available!
+
==== CTF  ====
<br>
+
 
<br>
+
During both days, a '''C'''apture '''T'''he '''F'''lag challenge will be online and available! <br> <br> <br>  
<br>
+
 
 
==== Registration  ====
 
==== Registration  ====
 
<center>
 
<center>
'''The training day and the conference are free!'''&nbsp;
+
'''The training day and the conference are free!'''&nbsp;  
  
 
<br>  
 
<br>  
  
[http://owaspbenelux.eventbrite.com?ref=ebtn http://www.owasp.org/images/7/77/Buttoncreate.png]  
+
[http://owaspbenelux.eventbrite.com?ref=ebtn [[Image:|Buttoncreate.png]]]  
  
 
<br> To support the OWASP organisation, consider to become a member, it's only US$50!<br> Check out the [[Membership]] page to find out more.<br>  
 
<br> To support the OWASP organisation, consider to become a member, it's only US$50!<br> Check out the [[Membership]] page to find out more.<br>  
Line 236: Line 269:
 
There will be a social conference evening at the eve of the first day, December 1st<br> Details to be posted soon! <br> <headertabs />  
 
There will be a social conference evening at the eve of the first day, December 1st<br> Details to be posted soon! <br> <headertabs />  
 
<center>Made possible by our [http://www.owasp.org/index.php/BeNeLux_OWASP_Day_2010#tab=Sponsorship sponsors]:<br>  
 
<center>Made possible by our [http://www.owasp.org/index.php/BeNeLux_OWASP_Day_2010#tab=Sponsorship sponsors]:<br>  
{{MemberLinks|link=http://www.ascure.com|logo=Ascure_Logo.jpg}}
+
{{MemberLinks|link=http://www.ascure.com|logo=Ascure_Logo.jpg}} [http://www.f5.com [[Image:|50px-F5_50px.jpg]]] [http://www.zionsecurity.com [[Image:|Zionsecurity.jpg]]] [http://www.radware.com [[Image:|Rad_logo.gif]]] [http://www.zenitelbelgium.com [[Image:|SAIT_Zenitel.jpg]]] [http://www.sogeti.nl [[Image:|Sogeti_Nederland_b_v_Logo.jpg]]]  
[http://www.f5.com http://www.owasp.org/images/7/7e/50px-F5_50px.jpg]
 
[http://www.zionsecurity.com http://www.owasp.org/images/e/e6/Zionsecurity.jpg]
 
[http://www.radware.com http://www.owasp.org/images/8/82/Rad_logo.gif]
 
[http://www.zenitelbelgium.com http://www.owasp.org/images/d/df/SAIT_Zenitel.jpg]
 
[http://www.sogeti.nl http://www.owasp.org/images/3/31/Sogeti_Nederland_b_v_Logo.jpg]
 
  
<br><br> '''Supported by:'''<br>
+
<br><br> '''Supported by:'''<br> [[Image:Bnl10 Fontys.jpg|200px]]  
[[File:Bnl10 Fontys.jpg|200px]]
 
  
 
<br>  
 
<br>  
 
</center>  
 
</center>  
 
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]
 
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]

Revision as of 17:48, 17 November 2010

OWASP BeNeLux 2010.png


Welcome


Confirmed Speakers:

Eoin Keary (OWASP Board, E&Y)
Sebastien Deleersnyder (OWASP Board, SAIT Zenitel)
Radu State (University of Luxembourg)
N Nikiforakis (Katholieke Universiteit Leuven)
Marco Balduzzi (Eurecom)
Walter Belgers (Madison Gurkha)
Thierry Zoller
...

Download the conference flyer here.
All the presentations will be available for download in the agenda tab.




Training, December 1st

{{Template:<img _fck_mw_includeonly="true" _fckrealelement="5" _fckfakelement="true" src="spacer.gif" class="FCK__MWIncludeonly"><img _fck_mw_noinclude="true" _fckrealelement="4" _fckfakelement="true" src="spacer.gif" class="FCK__MWNoinclude"> | Course_designation = OWASP Projects and Resources you can use TODAY!

| Course_Overview_Goal = 

  • Apart from OWASP's Top 10, most OWASP Projects are not widely used and understood. In most cases this is not due to lack of quality and usefulness of those Document & Tool projects, but due to a lack of understanding of where they fit in an Enterprise's security ecosystem or in the Web Application Development Life-cycle.
  • This course aims to change that by providing a selection of mature and enterprise ready projects together with practical examples of how to use them.
  • If you are interested in participating in the hands on portion of the course, please bring a laptop.

  | Date = December 1, 2010 | Venue = Fontys Hogescholen, Den Dolech 2, Traverse 3.43, Eindhoven, The Netherlands

How to get here:

| Price = Free | Course_Registration_url = http://www.owasp.org/index.php/BeNeLux_OWASP_Day_2010#tab=Registration | Course_Registration_name = Register Now | Modules =


|- | valign="middle" bgcolor="#EEEEEE" height="30" align="center" |    11h00 (30m) | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | Guided tour of OWASP Projects | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | Tour of OWASP’s projects | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | See details and Trainer's notes


|- | valign="middle" bgcolor="#EEEEEE" height="30" align="center" |    11h30 (45m) | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | Threat Risk Modeling | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | Martin Knobloch | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | Threat Modeling – how to do it | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | See details and Trainer's notes


|- | valign="middle" bgcolor="#FFFFFF" align="center" |    12h15 (15m) | valign="middle" bgcolor="#FFFFFF" align="center" | Coffee Break | valign="middle" bgcolor="#FFFFFF" align="center" | | valign="middle" bgcolor="#FFFFFF" align="center" | | valign="middle" bgcolor="#FFFFFF" align="center" |


|- | valign="middle" bgcolor="#EEEEEE" height="30" align="center" |    12h30 (45m) | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | OWASP Testing Guide | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | Martin Knobloch | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | Application Security Using the Testing Guide | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | See details and Trainer's notes


|- | valign="middle" bgcolor="#FFFFFF" align="center" |    13h30 (60m) | valign="middle" bgcolor="#FFFFFF" align="center" | Lunch | valign="middle" bgcolor="#FFFFFF" align="center" | | valign="middle" bgcolor="#FFFFFF" align="center" | | valign="middle" bgcolor="#FFFFFF" align="center" |


|- | valign="middle" bgcolor="#EEEEEE" height="30" align="center" |    14h30 (60m) | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | OWASP Top 10 | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | Sebastien Deleersnyder | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | OWASP Top 10 - Issues and Remedies | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | See details and Trainer's notes


|- | valign="middle" bgcolor="#EEEEEE" height="30" align="center" |    15h30 (90m) | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | OWASP Code Review Project | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | Eoin Keary | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | OWASP Code Review | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | See details and Trainer's notes


|- | valign="middle" bgcolor="#FFFFFF" align="center" |    17h00 (15m) | valign="middle" bgcolor="#FFFFFF" align="center" | Coffee Break | valign="middle" bgcolor="#FFFFFF" align="center" | | valign="middle" bgcolor="#FFFFFF" align="center" | | valign="middle" bgcolor="#FFFFFF" align="center" |


|- | valign="middle" bgcolor="#EEEEEE" height="30" align="center" |    17h15 (60m) | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | OWASP Software Assurance Maturity Model | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | Sebastien Deleersnyder | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | Software Assurance Maturity Model & Secure Development Lifecycle | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | See details and Trainer's notes


}}


Conference, December 2nd

Location - December 2nd, 2010
from - to Registration
from - to

Agenda:

  • Welcome and OWASP Update (by Eoin Keary, OWASP Board, E&Y and Seba Deleersnyder, OWASP Board, SAIT Zenitel)
  • 0wning Networks with VoIP and Web attacks (by Radu State, University of Luxembourg)
Voice over IP is the current de facto technology for delivering voice data in both enterprise and service provider infrastructure. Although , security threats specific to VoIP signalling have been known for a while, few is known about cross-layer attacks in which Web enabled VoIP devices allow for efficient attacks against the VoIP infrastructure and general IT networks .
This talk will give a short introduction to VoIP and continue with a series of attacks that leverage SIP as efficient transport vehicle for billing attacks , disclosure attacks and network penetration. The talk will show how one single phone call can compromise even the best secured and hardened network perimeter .
  • Privacy of file sharing service (by N Nikiforakis, Katholieke Universiteit Leuven)
File sharing services are used daily by tens of thousands of people as a way of sharing files. Almost all such services, use a security-through-obscurity method of hiding the files of one user from others. For each uploaded file, the user is given a secret URL which supposedly cannot be guessed. The user can then share his uploaded file by sharing this URL with other users of his choice. Unfortunately though, a number of file sharing services are incorrectly implemented allowing an attacker to guess valid URLs of millions of files and thus allowing him to enumerate their file database and access all of the uploaded files. In this paper, we study some of these services and we record their incorrect implementations. We design automatic enumerators for two such services and a privacy-classifying module which characterises an uploaded file as private or public. Using this technique we gain access to thousands of private files ranging from private and company documents to personal photographs. We present a taxonomy of the private files found and ways that the users and services can protect themselves against such attacks.
  • Clickjacking: an empirical study with an automated testing/detection system (by Marco Balduzzi, Eurecom)
Clickjacking recently received new media attentions: Thousands of Facebook users have fallen victims of a worm that uses clickjacking techniques to propagate.
In a clickjacking attack, a malicious page is constructed (or a benign page is hijacked) to trick the user into performing unintended clicks that are advantageous for the attacker, such as propagating a web worm, stealing confidential information or abusing of the user session.
However it is currently unclear to what extent clickjacking is being used by attackers in the wild and how significant the attack is for the security of Internet users.
In this talk, we presents a solution we designed for studying the prevalence of clickjacking on the Internet and for detecting possible malicious pages in an automated fashion. We deployed our system over 10 distinct virtual machines to test more then a million unique web-pages in two months. From the analysis of our experimental results we discuss the clickjacking phenomenon and its future implications.
  • Attacking is easy, defending is hard (by Walter Belgers, Madison Gurkha)
An attacker has an easy job. They need only find one security hole, and they've broken the system. The system, application and network administrators :have a much harder task. They have to find not just one, but each and every one of the holes. Preferably before the bad guys do.
And, these holes can be at several different layers. In the presentation, we will look at those layers (system level, application level, but also user :level) and observe what goes wrong and how to fix it. The observations come from the daily work at Madison Gurkha.
Examples of problems are lack of patches, problems during the development phase, susceptibility to social engineering attacks and more.
  • How not to design and implement a cash back system (by Thierry Zoller)
  • The OWASP code review guide (by Eoin Keary, OWASP Board, E&Y)
  • The Social Networking Corporate Threat (by Chen Gour Arie, Comsec)
Social Networking Sites (SNS) and Web 2.0 platforms have been growing rapidly over the past few years, with multi-millions utilizing these platforms on :a daily basis. In this talk, we will present some of the threats that SNS introduces to the corporate environment.

..

Speakers

Eoin Keary (OWASP Board, E&Y)
Chapter Lead and founder of OWASP Ireland chapter. Co-Author,Co - Editor and team lead of the OWASP Testing Guide.

Co-Author, Editor/team lead of the OWASP Code Review guide.

Sebastien Deleersnyder (OWASP Board, SAIT Zenitel)
Sebastien started the successful Belgian OWASP Chapter and performed several public presentations on web application and web services security. Sebastien specialises in (web) application security, combining his software development and information security experience. He is currently OWASP Foundation board member and Managing Technical Consultant at SAIT Zenitel.
Radu State (University of Luxembourg)
Radu received his PhD degree from INRIA, Nancy – University Henri Poincaré in 2001.

Radu has held positions as Research Engineer and Senior Engineer at INRIA-LORIA and has been working as Senior Researcher at the University of Luxembourg, FSTC-CSC Research Unit from October 2008 to September 2010. Radu's research activity will be on one side investigate interoperability aspects to supply security components in the area of ubiquitous computing and on the other side set up a project specific interoperability research lab in close cooperation with industry.

Nick Nikiforakis (Katholieke Universiteit Leuven)
Nick Nikiforakis is a PhD student at the Katholieke Universiteit Leuven, in Belgium. He belongs to the DistriNet research group and specifically in the “Security & Languages” task-force. His current research interests are: low-level security for unsafe languages and web application security.

Nick holds a BSc in Computer Science and a MSc on Distributed Systems from the University of Crete in Greece. He worked for 3 years as a research assistant in the Distributed Computing Systems group at the Foundation of Research and Technology in Crete where he did research in network data visualization, authentication schemes using mobile devices and phishing countermeasures. In the past, Nick has presented his work in academic conferences as well as hacking conventions. His work can be found online at www.securitee.org.

Marco Balduzzi (Eurecom)
Marco Balduzzi was born in Seriate (Italy) in 1982. He has studied Computer Engineering at the University of Bergamo where he has obtained his Master (Eng. Msc.) with a thesis titled «Security by virtualization: a novel antivirus for personal computers». During his graduation studies, in 2005 he has spent six months as exchange student at the University of Science and Technology of Trondheim (Norway), and the following year he has joined an IT-security company in Munich (Germany) to perform an internship oriented to the research of a new system architecture for computers defense. Marco is interested in Linux and Free-Software since the year 2000, when he co-founded the Bergamo's Linux User Group. Since 2004, he has worked as IT-security and networking specialist for several companies in Milan (Italy), Munich (Germany) and Sophia-Antipolis (France). In October 2008, he has joined EURECOM as Ph.D. student, where he works in the research group of Applied Security iSecLab under the supervision of Prof. Engin Kirda
Walter Belgers (Madison Gurkha)
Walter Belgers heeft Technische Informatica gestudeerd aan de Technische Universiteit Eindhoven met als extra vak o.a. Computercriminaliteit (Universiteit van Tilburg). Walter is in 1994 begonnen bij Philips C&P (tegenwoordig Atos Origin) als ontwikkelaar van wereldwijde firewall-diensten en de uitrol daarvan. Daarna heeft hij enkele jaren lesgegeven op het gebied van UNIX en Internet beveiliging bij AT Computing. In 2002 is hij toegetreden tot Madison Gurkha als partner. Naast zijn technische consultancy-activiteiten, houdt Walter zich bezig met het schrijven van artikelen en columns, het geven van lezingen en voorlichten van de pers. Walter is gecertificeerd security professional (CISSP) en security auditor (CISA).
Martin Knobloch (Sogeti Nederland B.V.)
Martin Knobloch is employed at Sogeti Netherlands as Senior Security Consultant. He is founder and thought leader of the Sogeti task force PaSS, Proactive Security Strategy, with an integral solution of information security within organisation, infrastructure and software.

At OWASP, Martin is board member of the OWASP Netherlands Chapter and member of the Global Education Committee.

Chen Gour Arie (Comsec)

CTF

During both days, a Capture The Flag challenge will be online and available!


Registration

The training day and the conference are free! 


[[Image:|Buttoncreate.png]]


To support the OWASP organisation, consider to become a member, it's only US$50!
Check out the Membership page to find out more.


Venue

Eindhoven, The Netherlands (Den Dolech 2, Traverse 3.43)


Hotels nearby:

maps.google.nl/maps

Organisation

The BeNeLux Day 2010 Program Committee:

Sponsorship

Contact netherlands <at> owasp.org for sponsorship

<paypal>BeNeLux OWASP Day 2010</paypal>

Social Event

There will be a social conference evening at the eve of the first day, December 1st
Details to be posted soon!
Made possible by our sponsors:

Ascure_Logo.jpg        [[Image:|50px-F5_50px.jpg]] [[Image:|Zionsecurity.jpg]] [[Image:|Rad_logo.gif]] [[Image:|SAIT_Zenitel.jpg]] [[Image:|Sogeti_Nederland_b_v_Logo.jpg]]



Supported by:
Bnl10 Fontys.jpg