This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Belgium

From OWASP
Revision as of 10:10, 3 September 2007 by LievenDesmet (talk | contribs) (PROGRAM)

Jump to: navigation, search

OWASP Belgium-Luxemburg

Welcome to the Belgium-Luxemburg chapter homepage. The chapter leader is Sebastien Deleersnyder


Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter. Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG


Local News

The next Belgium Chapter Event is on September 6 as part of OWASP Day. We are delighted to let you know Mark Curphey, Petko Petkov - pdp (architect), David Kierznowski, Bart De Win and Luc Beirens (FCCU) will be coming to the event. More details below. We have room for 400 people: everyone is challenged to invite an extra person new to OWASP!


The chapter meeting after that is scheduled for Nov 20th.


We would also love to set up a first chapter meeting in October: host sponsor, speaker & topic suggestions are welcome!

Chapter Board

The BeLux Chapter is now supported by an active board:

  • Erwin Geirnaert, Zion Security
  • Philippe Bogaerts, NetAppSec
  • André Mariën, Cybertrust
  • Lieven Desmet, K.U.Leuven
  • Joël Quinet, Unisys
  • Sebastien Deleersnyder, Telindus

Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects.

Structural Sponsors 2007

OWASP BeLux would like to thank the following organizations for sponsoring this chapter. If you are interested in sponsoring the BeLux chapter please contact seba 'at' deleersnyder.eu .

50px-F5_50px.jpg

Next Event: OWASP Day (6-Sep-2007)

On September 6th, OWASP will be organizing OWASP Day conferences worldwide triggered by the Global Security Week idea.

In Belgium we organize the mini-conference in Brussels for which we already have an interesting agenda.

Confirmed speakers:

WHEN

Thursday, September 6th, 2007 (2-7pm)

WHERE

Telindus, Belgacom ICT sponsors the venue:
Location: SURF House, Rue Stroobants 51, 1140 Evere.
You can find a map and itinary online.
Parking places are available.

PROGRAM

The theme of the world-wide OWASP Day is “Privacy in the 21st Century”.

The event starts with an introductory session on WebGoat & WebScarab at 12h30, and start the mini-conference itself at 14h.

The agenda looks as follows:

Please send a mail to belgium 'at' owasp.org if you plan to attend, so we can size the venue appropriately and keep you updated on last-minute changes. Also, don't forget to indicate your attendance for the 'Getting started with WebGoat & WebScarab' session.

Getting started with WebGoat & WebScarab (Erwin Geirnaert)

In this tutorial you will learn how to use WebScarab to solve the lessons in WebGoat.

Following points will be explained:

  • Configure WebScarab as a local proxy
  • Intercepte HTTP requests and responses
  • Modify HTTP requests to solve the lesson “Hidden field manipulation”
  • Modify HTTP responses to solve the lesson “Bypass client-side Javascript validation”
  • Use the session analysis tab in WebScarab
  • Use the web services tab in WebScarab
  • Use WebScarab to analyze Ajax XML messages

!! Prerequisites:

  • Bring your own laptop with you!
  • Download WebScarab onto your laptop
  • Download WebGoat onto your laptop


Erwin Geirnaert is CEO and co-founder of ZION Security. He is a renowned application security expert and has presented on various conferences like Javapolis, Eurostar, Owasp,… about web security. He is board member of OWASP Belux and actively involved in various OWASP projects like OWASP Java and OWASP WebGoat. Because of his technical experience he loves to do security testing, code review, reverse engineering,.. for Fortune 1000 companies in Europe. More information can be found on his LinkedIn profile: http://www.linkedin.com/in/erwingeirnaert.

OWASP Evaluation and Certification Criteria Draft (Mark Curphey)

As opposed to me continuing saying what’s wrong with PCI DSS, it seems to me that OWASP is a perfect forum to simply create and publish a “better criteria”. This can either be adopted and implemented by an organization like OWASP or considered to be incorporated into the PCI or other security standards. We won't get bogged down in the politics up-front, but hold something good up to the world for people to adopt. This project would of course draw on and bring together many of the other OWASP Projects including the Guide (What is a secure web app), Testing Guides (How to test for a secure web app), WebGoat (part of how to certify an individual understands and can find web app issues) etc. Many of those projects may not be complete or a perfect fit today, but this project can bring a common connecting theme to a lot of very valuable IP that OWASP has built over the years. I will also create it in such as way that a corporate could adopt/adapt it themseles as well as an industry. Where other OWASP projects are not complete or currently suitable I will build a requirements doc that can be considered by those teams if they feel appropriate.

Mark Curphey ran Foundstone consulting from 2003 until late 2006 during which time the company was sold to McAfee. Before joining Foundstone Mark was the Director of Information Security at Charles Schwab (responsible for the software security program) and has also worked for ISS and several financial services companies in Europe. Mark has a Masters degree in information security from Royal Holloway, University of London and was the original founder of the Open Web Application Security Project (OWASP).

Automated Web FOO or FUD? (David Kierznowski)

We take a look into automated web application testing technologies and their effectiveness against real life applications.

Also, we look into one of GNUCITIZENs latest projects, The Technika Security Framework (TSF), which will enable users to automate security testing directly from their browser.

David Kierznowski currently works as a Senior Security Analyst for a leading penetration testing company in the UK. He has worked in the security industry for the past 6 years. David is also the founder of both michaeldaw.org and blogsecurity.net and is an active member of the GNUCITIZEN group.

OWASP Pantera Unleashed (Simon Roses Femerling)

The presentation will provide a glimpse into what Pantera can offer when performing blackbox web assessments. In the age of Web 2.0 we need powerful tools that provide us rich and accurate information and allows us to manipulate that information into our advantage, that's what Pantera is all about.

Simon Roses Femerling is a Security Technologist at the ACE Team at Microsoft. Former PwC and @Stake. He has many years of security experience where he has authored and cooperated in several security Open Source projects and advisories. Simon is natural from wonderful Mallorca Island in the Mediterranean Sea. He holds a postgraduate in E-Commerce from Harvard University and a B.S. from Suffolk University at Boston, Massachusetts.

CLASP, SDL and Touchpoints Compared (Bart De Win)

tbd

Bart De Win is a postdoctoral researcher in the research group DistriNet, Department of Computer Science at the Katholieke Universiteit Leuven. His research interests are in secure software engineering, including software development processes, aspect-oriented software development and model driven security.

Threats of e-insecurity in Belgium and the Belgian response (Luc Beirens, FCCU)

The presentation will give a short overview of the actual threats on the e-society in Belgium. How are public and private sector organized (or not) to tacle the different problems ? What are the tasks of the police within this framework ?

Since 1991, chief superintendent Luc Beirens is engaged in computer forensics and cyber crime investigations. He is head of the Federal Computer Crime Unit of the Federal Police since 2001. Aside consulting his detectives in current cyber crime investigations, he is responsible for the reorganization, the equipment and the training of Belgian police services concerned with cyber crime investigations. As member of the European Working Party on Information Technology Crime (EWPITC) of Interpol since 1995 and the EUROPOL cyber crime expert group since 2001, he has cooperated in writing several documents concerning computer forensics and cyber crime investigations. He lectures in these fields at several police academies and universities. His is involved in several organizations and platforms that are concerned with e-security, ICT forensics and cyber crime combating. Before his detective career, he has worked from 1987 till 1995 as analyst and project manager on the development of the Police Information System of the Belgian Gendarmerie. He holds master degrees in criminology and information technology.

For my next trick... hacking Web2.0 (pdp)

Web2.0, if I can summarize it with a few simple words, is all about communication, distribution, information, agents, clients and servers. Those who understand the 2.0 fundamentals have the power to manipulate the global Web to suit their needs - hackers, the new digital breed of the 2.0 world. Web2.0 hacking is a mean for communicating and distributing critical information in a better way. It can be used to build ghost infrastructures from where to launch attacks - anonymously, no traces, nothing. Web2.0 hacking is also about the thin line between client-side and server-side security. It is about the endpoints and the electronic highways. It is about reaching the masses and yet being able to perform attacks on specific targets. Web2.0 hacking is also about distribution and influence, covert channels, bots, IA, ghosts inside the electronic frame. Web2.0 hacking is also a movement, a cyber subculture where individuals show their technical abilities, and understandings of the world and use that to manipulate their way through the system.

Web2.0 hacking practices should never be related to AJAX and JavaScript exploitation techniques only. Although it is true that client-side security has a significant part of the Web2.0 ecosystem, it is important to realize its role. There are far too many other aspects that we need to look into. My aim is to cover these aspects and reveal the hidden dangers.

Petko D. Petkov, a.k.a pdp (architect), is the founder and leading contributer of the GNUCITIZEN group. He is a senior IT security consultant based in London, UK. His day-to-day work involves identifying vulnerabilities, building attack strategies and creating attack tools and penetration testing infrastructures. Petko is known in the underground circles as pdp or architect but his name is well known in the IT security industry for his strong technical background and creative thinking. He has been working for some of the world's top companies, providing consultancy on the latest security vulnerabilities and attack technologies.

REGISTRATION

Please send a mail to belgium 'at' owasp.org if you plan to attend, so we can size the venue appropriately and keep you updated on last-minute changes. Also, don't forget to indicate your attendance for the 'Getting started with WebGoat & WebScarab' session.

Last Chapter Meeting (Brussels, 22-June-2007)

During an extra edition we brought you 2 big names in web application security. F5 Networks sponsored Ivan Ristic and Dinis Cruz to come to Brussels on Friday 22nd of June to bring you hot items from the last conference in Italy last May (agenda with presentations online).

We also had the skipped presentation of last time: Hillar Leoste from Zone-H will provided us with an update on defacements in the BE domain for last year.

WHEN

Friday 22nd of June 2007

WHERE

Deloitte sponsored the venue, drinks and snacks: Location: Deloite Diegem

PROGRAM

  • 18h00 - 18h20: Welcome, coffee & sandwiches
  • 18h20 - 18h40: Sebastien Deleersnyder

        OWASP Update

  • 18h40 - 19h00: Hillar Leoste (Zone-H)

        Update on Internet Attack Statistics for Belgium in 2006

  • 19h00 – 20h00: Ivan Ristic, Chief Evangelist, Breach Security
Ivan Ristic is the creator of ModSecurity (an open source web application firewall and intrusion detection/prevention engine). Ivan also wrote Apache Security for O'Reilly, a web security guide for administrators, system architects, and programmers.
For more info, see Anurag Agarwal’s reflection on Ivan Ristic.

        Protecting Web Applications from Universal PDF XSS

Presentation + A discussion of how weird the web application security world has become
  • 20h00 - 20h15: break
  • 20h15 - 21h15: Dinis Cruz, Chief Owasp Evangelist
Dinis Cruz is a renowned application security expert who is passionate about training developers to move beyond the ‘comfort zone’ of standard ASP.NET development and into the world of advanced security aware development with the aim of making the Web Applications as secure as possible against malware and malicious hackers. Dinis is also the project leader for the OWASP .Net Project and the and the main developer of several of OWASP .Net tools (SAM’SHE, ANBS, SiteGenerator, PenTest Reporter, ASP.Net Reflector, Online IIS Metabase Explorer). author of many Open Source security tools (see http://www.owasp.org/index.php/.Net).

        Buffer Overflows on .Net and Asp.Net

One of the common myths about the .Net Framework is that it is immune to Buffer Overflows. Although this might be correct in pure managed and verifiable .Net code, large percentage of .Net and Asp.Net applications code is unmanaged code. In this talk Dinis will show the areas in .Net and Asp.Net applications that are vulnerable to Buffer Overflows (including the demo of a .Net Buffer Overflow Fuzzer).

Chapter Meeting Archive

Meeting Notes OWASP Chapter Meeting (Leuven, 10-May-2007)

WHEN
May 10th 2007
WHERE
ps_testware sponsored the venue:
Location: Kasteel de Bunswyck, Tiensesteenweg 343, 3010 Leuven.
You can find a map and itinary online. PROGRAM

  • 18h00 - 18h20: Welcome, coffee & sandwiches
  • 18h20 - 18h40: Sebastien Deleersnyder

        OWASP Update and OWASP BeLux Board Presentation

  • 18h40 - 20h00: Jos Dumortier

        Legal Aspects of (Web) Application Security (Presentation + Discussion)

Jos Dumortier discussed important questions such as:
  • How far can you go if you want to ‘test’ the security of a web site?
  • How much application security can you contractually demand for when you outsource your application development?
  • Who is legally responsible when you personal data is exposed through hacking activity in Belgium?
Jos Dumortier is Of Counsel in the ICT and e-Business department of Lawfort. He is also Professor of Law at the Faculty of Law (K.U.Leuven) and Director of the Interdisciplinary Centre for Law and Information Technology (http://www.icri.be).
  • 20h00 - 20h15: break
  • 20h15 - 21h15: Lieven Desmet

        Formal absence of implementation bugs in web applications: a case study on indirect data sharing (Presentation + Discussion)

Several research tracks focus on tools and techniques to verify or guarantee the absence of implementation bugs in web applications, either at compile-time or at run-time. By guaranteeing the absence of certain implementation bugs, the reliability and security of the application can be improved. In this presentation, we will focus on the absence of implementation bugs due to broken data dependencies.
Web applications typically share non-persistent session data between different parts of the application, e.g. a shopping cart in a e-commerce application. By doing so, implicit dependencies arise between the different parts of the application, and breaking these dependencies in an application may result in information leakage of erroneous behavior.
In our research, we explicitly model dependencies between components that indirectly share data. Next, we verify that in a given composition these dependencies are not broken by applying a combination of static verification and dynamic checking (e.g. by using a Web Application Firewall).
We validated the presented approach in two existing applications: a Struts-based, open-source webmail application (GatorMail) and an e-commerce site (Duke's BookStore from the J2EE 1.4 tutorial).
Lieven Desmet Lieven Desmet was born on January 16, 1979 in Roeselare. He received a Bachelor of Applied Sciences and Engineering degree and graduated magna cum laude in Master of Applied Sciences and Engineering: Computer Science from the Katholieke Universiteit Leuven in July 2002.
He started working as a Ph.D. student at the DistriNet (Distributed systems and computer Networks) research group of the Department of Computer Science at the Katholieke Universiteit Leuven. Within DistriNet, he was active in both the networking and security task forces. Lieven received his PhD on software security in January 2007 and is currently active as a post-doctoral security researcher within DistriNet.

OWASP Top 10 2007 Update (Infosecurity Belgium, 21 & &22 Mar 2007)

Seba presented the 2007 OWASP Top 10 (currently available as OWASP Top 10 2007 RC1) on the Infosecurity event in Belgium on the 21st and 22nd of March 2007.

The presentation is uploaded on: File:OWASP Intro and Top 10 2007.zip.

Meeting Notes OWASP Chapter Meeting (Brussels, 23-Jan-2007)

WHEN
January 23rd 2007
WHERE
Ernst&Young Offices (Business Centre) in Brussels. Parking places are available at nr 216.
Here you can find directions.
PROGRAM

  • 18h00 - 18h30: Welcome, get drink & sandwiches?
  • 18h20 - 18h40: Sebastien Deleersnyder

        OWASP Update

  • 18h45 – 19h45: Philippe Bogaerts

        WEBGOAT and the Pantera Web Assessment Studio Project
The OWASP presentation will shed a light on WEBGOAT and the Pantera Web Assessment Studio Project. Both OWASP projects will be covered and illustrated with a live demo, with a special focus on Webgoat and web services.
        Presentation + Discussion?
Philippe Bogaerts is an independent consultant specialized in network and application security testing, web application and XML firewalls.

  • 19h45 - 20h00: break
  • 20h00 - 21h00: Bart De Win

        Security implications of AOP for secure software
Over the last decade, Aspect Oriented Programming (AOP), a development paradigm that focuses on improving the modularisation of crosscutting concerns, has received a great deal of attention from the academic as well as from the industrial community. In the context of secure software development, AOP has been shown to bring a number of benefits, at least from a software engineering perspective. From a security perspective, the characteristics of AOP have been studied less. One of the key questions at this moment is whether we can really use AOP to build \emph{secure} software ?
In this presentation we will address this key question by elaborating on a number of security implications of AOP. Risks will be shown to originate from the core concepts of AOP, as well as from tool-specific implementation strategies (with a specific focus on AspectJ). The presentation will be concluded by indicating how these risks could be mitigated, both from a theoretical and from a practical perspective.
        Presentation + Discussion?
Bart De Win is a postdoctoral researcher in the research group DistriNet, Department of Computer Science at the Katholieke Universiteit Leuven. His research interests are in secure software engineering, including software development processes, aspect-oriented software development and model driven security.

JavaPolis 2006 - Stephen de Vries - Security Sins and their Solutions

Stephen de Vries (project leader of the OWASP Java Project) did a talk at JavaPolis in Belgium about "Security Sins and their Solutions" that can be viewed again online on Parleys.

The talk covers the most insidious security vulnerabilities in Java Web and EE applications through practical demonstration of how to exploit these vulnerabilities and recommendations on how to prevent them. The threat posed by each vulnerability is explained and strategies for mitigating the flaw are introduced.

Meeting Notes OWASP Belgium Chapter Meeting (Antwerp, 14-Sep-2006)

WHEN
Thursday 14th of September 2006, 18h00 - 21h00.
WHERE
ING sponsored the venue and sandwiches.
PROGRAM

  • 18h00 - 18h30: Welcome, get drink & sandwiches
  • 18h20 - 18h40: Sebastien Deleersnyder, Ascure

        OWASP 2.0 Update

  • 18h45 – 19h00: Toon Mordijck, ISSA

        ISSA Introduction

  • 19h00 - 19h55: Serge Moreno, ING

        Business Application Security through Information Risk Management
        Presentation + Discussion
The presentation showed how ING has implemented business application security by implementing a risk management approach. By starting from the definition of risks and risk management, we have changed the program governance and project lifecycle to ensure that security is not seen as an add-on in a late stage of the project, but that the security requirements are defined in the early start of a project. By this approach the security requirements are becoming real functional requirements which are supported by the business. The net result is that security is not an after-thought anymore but totally integrated in the product and its (functional) requirements. As security requirements have become demands of the business, they are not taken out when the project is getting in time and budget constraints. These are all the positive consequences we have obtained from the method that will be explained throughout the presentation.

  • 20h05 - 21h00: Guy Crets, Apogado

        Secure and Reliable Web Services
        Presentation + Discussion
Web Services are becoming a very popular protocol for communication between IT systems within and between organizations. Web services offer a nice alternative for all sorts of communication middleware. The security of Web Services is a major attention point, now being well addressed with the WS-Security standards. Guy Crets not only explains what WS-Security is, but also opens up the subject by addressing many related topics: how does WS-* compare to B2B protocols such as EDIINT AS2, why not use SOAP over email or FTP, the importance of WS-Addressing, shortcomings in WS-ReliableMessaging, what is the importance of Microsoft WCF (aka Indigo), ... and many more.

Meeting Notes OWASP Belgium Chapter Meeting (Brussels, 8-May-2006)

WHEN
Monday 8th of May 2006, 18h30 - 22h30.
WHERE
Deloitte sponsored the venue, drinks and snacks.
PROGRAM

  • 18h00 - 18h30: Welcome, get drink & snack
  • 18h20 - 18h40: Sebastien Deleersnyder, Ascure

        OWASP Update

  • 18h45 - 19h15: Hillar Leoste, Zone-H

        Internet Attack Statistics for Belgium in 2005

  • 19h15 - 20h30: Johan Peeters, Program Director secappdev.org

Can "Agile" Development Produce Secure Applications?
Received wisdom has it that secure development and agile processes do
not mix. Is that really so? Agile practices have proven in many
projects to yield applications with fewer functional defects. Can they
also be put to work to reduce the number of security vulnerabilities?
The audience added to the discussion with questions and remarks!

Meeting Notes OWASP Belgium Chapter Meeting (Leuven, 22-Feb-2006)

WHEN
Wednesday 22nd of February 2006, 18h00 - 21h00.

WHERE
KUL sponsored the venue:
BeeWare sponsored the Pizza and Drinks!

PROGRAM
18h00 - 18h20: Welcome, get Pizza & Drink
18h20 - 18h40: Sebastien Deleersnyder, Ascure
        OWASP (Membership) and new OWASP Projects
18h40 - 19h30: Philippe Bogaerts, BeeWare
        WebScarab demonstration
19h30 - 20h45: Web Application Firewalls (WAF): Panel Discussion
        First a WAF Primer was presented.
Then we organized a panel discussion with people from industry, vendors and research:
How mature are WAFs?
What do WAFs protect you from? What not?
Where do you position WAFs in your architecture?
What WAF functionality do you really need?

We then had an interesting panel Discussion with:

  • Philippe Bogaerts, BeeWare
  • Jaak Cuppens, F5 Networks
  • David Van der Linden, ING Belgium
  • Lieven Desmet, K.U.Leuven

The audience (up to 50 !) added to the discussion with questions and remarks!


Belgium OWASP 2006 New Year Drink

On January 19th we had a New Years Drink.
It was sponsored by Zion Security
        Presentation


Meeting Notes second OWASP Belgium Chapter meeting (Leuven, 28-Sep-2005)

On 28th of September 2005 we had our second OWASP Belgium Chapter meeting. We had nearly 50 people coming to the meeting!

WHEN
Wednesday 28th of September 2005, 18h00 - 21h00 at Ubizen in Leuven.

PROGRAM
18h00 - 18h15: Welcome & get a drink

18h15 - 18h45: Sebastien Deleersnyder, Ascure
        OWASP & OWASP Membership

18h45 - 19h30: Emmanuel Bergmans, I-logs
        Securing Web Applications with ModSecurity
Emmanuel gave an interesting introduction on ModSecurity.
The presentation is included as attachment and contains a lot of great pointers and SWOT analysis.
Conclusions were:
ModSecurity can be particularly useful in an ISP environment
Increased effort is necessary to synchronize multiple ModSecurity configurations in a Webfarm

19h30 - 20h45:
OWASP Top 10 Vulnerabilities: Panel Discussion
        The presentation is included with an introduction of the TOP 10.
Then we had a lively panel Discussion with:

  • Erwin Geirnaert, Security Innovation
  • Dirk Dussart, Belgian Post
  • Eric Devolder, Mastercard
  • Herman Stevens, Ubizen
  • Frank Piessens, KU Leuven


We handled questions about the Top 10:

  • Is the OWASP Top 10 still necessary?
  • Are we talking vulnerabilities, solutions or threats?
  • Can we base our best practices / standards on the Top 10?
  • How to test your web site security on the Top 10?

The overall discussion was interesting, and at times diverted to an overall application security discussion.
Some of the remarkable opinions covered:
Can / or should the OWASP Top 10 form the basis for a certification scheme
If it is used as an awareness tool, can we promote it with an OWASP magazine?
The OWASP Top 10 is too vague
A bigger exhaustive list is needed with a clear classification and taxonomy
It should be based on threat modelling.
One of the more pertinent questions: how did the original authors come to the Top 10?


Meeting Notes First OWASP Belgium Chapter Meeting (Gent, 26-May-2005)

On 26th of May 2005 we held the first OWASP Belgium Chapter meeting!

It was a big success: we had nearly 40 people attending, despite the Belgium-unlike hot weather.


PROGRAM
17h30 - 18h00: Welcome & get a drink

18h00 - 18h45: Sebastien Deleersnyder, Ascure
        OWASP Introduction

19h00 - 19h45: Erwin Geirnaert, Security Innovation
        How to Break Web Application Security

20h00 - 20h45: professor Frank Piessens, KU Leuven
        How to Build Secure Web Applications

We had some interesting discussions with Frank on the position of security controls: within the code or within the supporting infrastructure?
Another idea is also to look for a top 10 solutions for Web Applications and have some guidance system when selecting countermeasures.