This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Cambridge

From OWASP
Revision as of 09:41, 22 October 2014 by Steven van der Baan (talk | contribs) (Past Events)

Jump to: navigation, search

OWASP Cambridge

Welcome to the Cambridge chapter homepage. The chapter leaders are Adrian Winckles and Steven van der Baan.


Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter. Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG


<paypal>Cambridge</paypal>

Local News

Cambridge OWASP Chapter Meeting

Tuesday 21 st October 2014 17:30 – 20:30, Lord Ashcroft Building (LAB003), Anglia Ruskin University, Cambridge. Hosted by the Department of Computing & Technology, Anglia Ruskin University, OWASP (Open Web Application Security Project) Cambridge Chapter


Guest speakers: Eireann Leverett

Eireann Leverett is a Senior Consultant at IOActive where he focuses on Smart Grid and SCADA systems. He studied Artificial Intelligence (AI) and Software Engineering at Edinburgh University and went on to get his Masters in Advanced Computer Science at University of Cambridge. He studied under Frank Stajano and Jon Crowcroft in Cambridge's computer security group. In between, he worked for five years at GE Energy and did a six-month engagement with ABB in their corporate research department.

Title : Switches get Stitches

This mini workshop is based on the successful 44Con talk this year and will introduce you to Industrial Ethernet Switches and their vulnerabilities. These switches are used in environments with industrial automation equipment, like substations, factories, refineries, and ports; in other words, SCADA and ICS switches. You will become familiar with how these switches are used and do some light traffic analysis and firmware reverse engineering, bring your laptop with Wireshark installed!! During this workshop, Eireann will discuss several vulnerabilities and share the methods used to discover them as well as techniques for exploitation.

This is partially a hands-on workshop, with pcaps, network forensics, binary analysis, web application vulnerabilities, etc. It teaches about bad session entropy, sidejacking, CSRF, brute forcing MD5, DoS in the context of industrial processes, and carving default private keys from firmware images. Essentially, this is "how I found the bugs in my CVE list for 2013-2014", breaking industrial ethernet switches.

Bring along your laptop with Wireshark installed.



Agenda

17:30 – 17:45 Welcome from the OWASP Cambridge Chapter Leader, Adrian Winckles, Course Leader in Information Security & Forensic Computing, Anglia Ruskin University

17:45 – 19:15 Eireann Leverett – IOActive – Switches got Stitches

19:15 – 19:30 Q & A – Further meetings and ideas.

19:30 – 20:30 Refreshments & Networking in LAB027


Registration:

To register for this free event, please register online here

The conference will be held in the Lord Ashcroft Building, Room LAB003 (Breakout Room LAB027 for networking & refreshments).

Please enter through the Helmore Building and ask at reception.


Meeting Location

Anglia Ruskin University

Cambridge Campus

East Road

Cambridge

CB1 1PT

Get further information on travelling to the university.

http://www.anglia.ac.uk/ruskin/en/home/your_university/anglia_ruskin_campuses/cambridge_campus/find_cambridge.html

Everyone is welcome to join us at our chapter meetings.

Next talks

Name Speaker Yiannis Chrysanthou (KPMG)
Bio Yiannis has been in the information security field for about 6 years now. Prior to joining KPMG, he was an Ethical Hacking Instructor and a Project Manager for various infrastructure projects.

He is an active member of Team Hashcat. Winner of Crackmeifyoucan competition at Defcon (2nd place in 2013,1st place in 2012, 2nd place in 2011 and 1st place in 2010), Winner of Positive Hackdays / Hashrunner (1st place 2012,2nd place 2013).

Title Modern Password Cracking
Abstract This presentation briefly describes the most popular password cracking techniques. It then suggests an optimized attack that combines several techniques with best performance in mind. The presentation suggests the use of Markov Chains for password recovery, in combination with a range of other modified versions of common attacks.

All attacks work together and make use of common resources such as Dictionaries, and Rulesets to achieve the most optimal output possible. The result is a dynamic, highly flexible and robust attack that can be used by anyone with average computer literacy and limited resources within reasonable time.

Name Speaker Damien King (KPMG)
Bio Damien has 1st class BSc Applied Computer Science; Distinction & MSc Information Security; Dissertation in Mobile Device Exploitation. 

He is currently a Penetration Tester at KPMG focusing on mobile and web application security.

He also have an interest in automation/scripting in python - hence the exploitation tool he will present.

Title Filename Enumeration with TildeTool
Abstract In certain versions of Microsoft IIS, it is possible to detect the short names of files and directories which have an 8.3 file naming scheme (e.g. FILENA~1.TXT) equivalent in Windows.

This issue particularly affects .Net websites that are vulnerable to direct URL access, as an attacker can find important files and folders that they are not normally visible.

We will first talk through the steps of how to test for this vulnerability manually, then demonstrate 'TildeTool' which automates the process.


Date Name / Title Link
21 October 2014 Eireann Leverett presentation
1st April 2014 Ian Glover (CREST) / Overview of the CREST activities to professionalise the industry.
Yiannis Chrysanthou (KPMG) / Modern Password Cracking
Damien King (KPMG) / Filename Enumeration with TildeTool
12th November 2013 Paul Cain / Tracking Data using Forensics
12th November 2013 James Forshaw/ The Forger's Art: Exploiting XML Digital Signature Implementations presentation
5th March 2013 Sarantis Makoudis / Android (in)Security presentation
5th March 2013 Nikhil Sreekumar / Power On, Powershell presentation