This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

BeNeLux OWASP Day 2013

From OWASP
Revision as of 10:09, 14 October 2013 by LievenDesmet (talk | contribs) (Remote Code Exection in WordPress: an analysis, by Tom Van Goethem (PhD University Leuven))

Jump to: navigation, search
Bnl13header-v.1.0.png



Welcome to OWASP BeNeLux 2013

The OWASP BeNeLux Program Committee

  • Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium
  • Martin Knobloch / Ferdinand Vroom, OWASP Netherlands
  • Jocelyn Aubert / Andre Adelsbach/ Thierry Zoller, OWASP Luxembourg


Tweet!

Event tag is #owaspbnl13

<paypal>BeNeLux OWASP Day 2013</paypal>


OWASP BeNeLux training day and conference are free!

Registration is not yet open:

Buttoncreate.png


To support the OWASP organisation, consider to become a member, it's only US$50!
Check out the Membership page to find out more.


Venue is






Parking & roadmap:

There is a public parking close to the conference venue.

Roadmap and parking:



Hotels nearby:



Conferenceday, November 29th

Location

TBD (for details, check the Venue tab)

Agenda

Time Speaker Topic
09h00 - 10h00 Registration
10h00 - 10h15 OWASP Benelux Organization Welcome
10h15 - 10h30 TBD OWASP update
10h30 - 11h10 TBD Title
Abstract:
11h10 - 11h50 TBD Title
Abstract:
11h50 - 12h30 TBD Title
Abstract:
12h30 - 13h30 Lunch
13h30 - 14h10 TBD Title
Abstract:
14h10 - 14h50 TBD Title
Abstract:
14h50 - 15h30 TBD Title
Abstract:
15h30 - 15h50 Break
15h50 - 16h30 TBD Title
Abstract:
16h30 - 17h10 TBD Title
Abstract:
17h10 - 17h50 TBD Panel Discussion about...
17h50 - 18h00 OWASP Benelux 2013 organization Closing Notes



Remote Code Exection in WordPress: an analysis, by Tom Van Goethem (PhD Researcher, University of Leuven)

Abstract:
With over 13 million downloads, WordPress is one of the most popular open source blog platforms and content management systems. One of its key features is the installation of plugins. These are developed by third parties, but WordPress has to maintain its legacy codebase in order to remain compatible with these plugins. As this codebase makes use of unsafe functions, vulnerabilities may arise, affecting thousands websites - if not more. This presentation will focus on a vulnerability that has been present in WordPress versions up to September 2013. This vulnerability, which may lead to Remote Code Execution, was found by a simple combination of two publicly known elements: PHP Object Injection and unexpected behaviour of MySQL regarding Unicode characters.

Bio:
Tom Van Goethem is passionate about web security. After getting a master's degree of Applied Informatics, he enrolled in a PhD at the University of Leuven. As a student with a chronic drinking problem, he still found some time to hunt bugs for fun (and profit).


Everything you always wanted to know about web-based device fingerprinting (but were afraid to ask), by Nick Nikiforakis (Postdoctoral Researcher, University of Leuven)

Abstract:
Billions of users browse the web on a daily basis, and there are single websites that have reached over one billion user accounts. In this environment, the ability to track users and their online habits can be very lucrative for advertising companies, yet very intrusive for the privacy of users.

In this talk, we are going to describe web-based device fingerprinting, i.e., the ability to tell users apart, without the use of cookies or any other client-side identifiers. We will explain how device fingerprinting works, who is using, for what reason, and how people are trying to defend against it today.

Bio:
Nick Nikiforakis is a Postdoctoral Researcher at KU Leuven in Belgium. Nick's interests lie in the analysis of online ecosystems from a security and privacy perspective and he has published his work in top conferences of his field. More information about him can be found on his personal page: http://www.securitee.org .




Social Event, November 28th

TBD

Capture the Flag!

  • Do you like puzzles?
  • Do you like challenges?
  • Are you a hacker?

Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux 2013 and participate in the Capture the Flag event November 29th 2013.

The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.

All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools.

So come, show off your skills, learn new tricks and above all have a good time at the CTF event.


Made possible by our Sponsors

PWC_log_resized.png        Zionsecurity.jpg Logo_Vest_BIG_170.gif