This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

BeNeLux OWASP Day 2010

From OWASP
Revision as of 18:18, 11 November 2010 by Sandra Paiva (talk | contribs)

Jump to: navigation, search
OWASP BeNeLux 2010.png


Welcome


Confirmed Speakers:

Eoin Keary (OWASP Board, E&Y)
Sebastien Deleersnyder (OWASP Board, SAIT Zenitel)
Radu State (University of Luxembourg)
N Nikiforakis (Katholieke Universiteit Leuven)
Marco Balduzzi (Eurecom)
Walter Belgers (Madison Gurkha)
...

Download the conference flyer here.
All the presentations will be available for download in the agenda tab.




Training, December 1st

{{Template:<img _fck_mw_includeonly="true" _fckrealelement="5" _fckfakelement="true" src="spacer.gif" class="FCK__MWIncludeonly"><img _fck_mw_noinclude="true" _fckrealelement="4" _fckfakelement="true" src="spacer.gif" class="FCK__MWNoinclude"> | Course_designation = OWASP Projects and Resources you can use TODAY!

| Course_Overview_Goal = 

  • Apart from OWASP's Top 10, most OWASP Projects are not widely used and understood. In most cases this is not due to lack of quality and usefulness of those Document & Tool projects, but due to a lack of understanding of where they fit in an Enterprise's security ecosystem or in the Web Application Development Life-cycle.
  • This course aims to change that by providing a selection of mature and enterprise ready projects together with practical examples of how to use them.
  • If you are interested in participating in the hands on portion of the course, please bring a laptop.

  | Date = December 1, 2010 | Venue = Fontys Hogescholen, Den Dolech 2, Traverse 3.43, Eindhoven, The Netherlands

How to get here:

| Price = Free | Course_Registration_url = http://www.owasp.org/index.php/BeNeLux_OWASP_Day_2010#tab=Registration | Course_Registration_name = Register Now | Modules =


|- | valign="middle" bgcolor="#EEEEEE" height="30" align="center" |    11h00 (30m) | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | Guided tour of OWASP Projects | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | Tour of OWASP’s projects | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | See details and Trainer's notes


|- | valign="middle" bgcolor="#EEEEEE" height="30" align="center" |    11h30 (45m) | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | [ ] | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | Martin Knobloch | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | [ Threat Modeling] | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | See details and Trainer's notes


|- | valign="middle" bgcolor="#FFFFFF" align="center" |    12h15 (15m) | valign="middle" bgcolor="#FFFFFF" align="center" | Coffee Break | valign="middle" bgcolor="#FFFFFF" align="center" | | valign="middle" bgcolor="#FFFFFF" align="center" | | valign="middle" bgcolor="#FFFFFF" align="center" |


|- | valign="middle" bgcolor="#EEEEEE" height="30" align="center" |    12h30 (60m) | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | [ ] | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | Sebastien Deleersnyder | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | [ OT10 issues & remedies] | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | See details and Trainer's notes


|- | valign="middle" bgcolor="#FFFFFF" align="center" |    13h30 (60m) | valign="middle" bgcolor="#FFFFFF" align="center" | Lunch | valign="middle" bgcolor="#FFFFFF" align="center" | | valign="middle" bgcolor="#FFFFFF" align="center" | | valign="middle" bgcolor="#FFFFFF" align="center" |


|- | valign="middle" bgcolor="#EEEEEE" height="30" align="center" |    14h30 (45m) | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | [ ] | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | Martin Knobloch | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | [ Testing] | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | See details and Trainer's notes


|- | valign="middle" bgcolor="#EEEEEE" height="30" align="center" |    15h15 (45m) | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | [ ] | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | [ ] | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | See details and Trainer's notes


|- | valign="middle" bgcolor="#FFFFFF" align="center" |    16h00 (15m) | valign="middle" bgcolor="#FFFFFF" align="center" | Coffee Break }


|- | valign="middle" bgcolor="#EEEEEE" height="30" align="center" |    16h15 (60m) | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | [ ] | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | Sebastien Deleersnyder | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | [ SAMM & SDLC] | valign="middle" bgcolor="#EEEEEE" height="30" align="center" | See details and Trainer's notes | valign="middle" bgcolor="#FFFFFF" align="center" | | valign="middle" bgcolor="#FFFFFF" align="center" | | valign="middle" bgcolor="#FFFFFF" align="center" |



Conference, December 2nd

Location - December 1st, 2010
from - to Registration
from - to

Agenda:

  • Welcome and OWASP Update (by Eoin Keary, OWASP Board, E&Y and Seba Deleersnyder, OWASP Board, SAIT Zenitel)
  • Combined Web and VoIP attacks (by Radu State, University of Luxembourg)
  • Privacy of file sharing service (by N Nikiforakis, Katholieke Universiteit Leuven)
  • Clickjacking: an empirical study with an automated testing/detection system (by Marco Balduzzi, Eurecom)
Clickjacking recently received new media attentions: Thousands of Facebook users have fallen victims of a worm that uses clickjacking techniques to propagate.
In a clickjacking attack, a malicious page is constructed (or a benign page is hijacked) to trick the user into performing unintended clicks that are advantageous for the attacker, such as propagating a web worm, stealing confidential information or abusing of the user session.
However it is currently unclear to what extent clickjacking is being used by attackers in the wild and how significant the attack is for the security of Internet users.
In this talk, we presents a solution we designed for studying the prevalence of clickjacking on the Internet and for detecting possible malicious pages in an automated fashion. We deployed our system over 10 distinct virtual machines to test more then a million unique web-pages in two months. From the analysis of our experimental results we discuss the clickjacking phenomenon and its future implications.
  • Attacking is easy, defending is hard (by Walter Belgers, Madison Gurkha)
An attacker has an easy job. They need only find one security hole, and they've broken the system. The system, application and network administrators :have a much harder task. They have to find not just one, but each and every one of the holes. Preferably before the bad guys do.
And, these holes can be at several different layers. In the presentation, we will look at those layers (system level, application level, but also user :level) and observe what goes wrong and how to fix it. The observations come from the daily work at Madison Gurkha.
Examples of problems are lack of patches, problems during the development phase, susceptibility to social engineering attacks and more.

..


Registration

The training day and the conference are free! 


[[Image:|Buttoncreate.png]]


To support the OWASP organisation, consider to become a member, it's only US$50!
Check out the Membership page to find out more.


Venue

Eindhoven, The Netherlands (Den Dolech 2, Traverse 3.43)


Hotels nearby:

maps.google.nl/maps

Organisation

The BeNeLux Day 2010 Program Committee:

Sponsorship

Contact netherlands <at> owasp.org for sponsorship

<paypal>BeNeLux OWASP Day 2010</paypal>

Social Event

There will be a social conference evening at the eve of the first day, December 1st
Details to be posted soon!
Made possible by our sponsors:

Ascure_Logo.jpg        [[Image:|50px-F5_50px.jpg]] [[Image:|Zionsecurity.jpg]] [[Image:|Rad_logo.gif]] [[Image:|SAIT_Zenitel.jpg]] Logo Sogeti.jpg

Supported by:
Bnl10 Fontys.jpg