This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Netherlands April 21st, 2016"
m |
(added speaker and venue information) |
||
Line 6: | Line 6: | ||
== Venue == | == Venue == | ||
− | : | + | Universiteit van Amsterdam |
− | + | ;Universiteitsbibliotheek | |
− | ==Programme | + | ;Singel 425, 1012 WP Amsterdam |
+ | ;[http://www.uva.nl/over-de-uva/de-uva-in-amsterdam/locaties/locaties/locaties/content/folder/binnenstad/universiteitsbibliotheek.html route] | ||
+ | ==Programme== | ||
:18:00 - 18:45 Registration & Pizzas | :18:00 - 18:45 Registration & Pizzas | ||
:18:45 - 19:00 OWASP Netherland and Foundation Updates | :18:45 - 19:00 OWASP Netherland and Foundation Updates | ||
− | :19:00 - 21:00 | + | :19:00 - 21:00 TBD - Youssef Oujamaa |
:20:00 - 20:15 break | :20:00 - 20:15 break | ||
− | :20-15 - 21:00 | + | :20-15 - 21:00 Web Application Firewall, Filter and Bypass - Aatif Khan |
:21:00 - 21:30 Networking | :21:00 - 21:30 Networking | ||
==Presentations== | ==Presentations== | ||
− | === | + | === Youssef Oujamaa === |
− | |||
− | |||
TBD | TBD | ||
+ | === Web Application Firewall, Filter and Bypass === | ||
+ | This talk will take you through different features used by Web Application Firewall which make it more difficult for penetration testers during their testing. These controls block many of the automated tools and simple techniques used to discover flaws today. | ||
+ | It will also give an overview on different filtering techniques and will explore how to determine the rule sets protecting the application. You'll be able to map out the rule sets and determine the specifics of how it detects attacks. After identifying the attacks, you will see how it can be bypassed. | ||
==Speakers== | ==Speakers== | ||
− | === | + | ===Youssef Oujamaa === |
− | |||
− | |||
TBD | TBD | ||
+ | ===Aatif Khan=== | ||
+ | |||
+ | Aatif Khan, cyber security researcher comes with over a decade of experience in information security. Apart from consulting on application security, he has also delivered infosec training's to corporate, defense personnel and cyber crime police officials. He has previously presented talk at OWASP Singapore, Malaysia, India and Dubai. He has also authored papers on Advance Persistence Threats, Hacking the Drones, Web Security 2.0, Android Application Penetration Testing. |
Revision as of 09:46, 8 January 2016
April 21st, 2016
Registration: tbd
Venue
Universiteit van Amsterdam
- Universiteitsbibliotheek
- Singel 425, 1012 WP Amsterdam
- route
Programme
- 18:00 - 18:45 Registration & Pizzas
- 18:45 - 19:00 OWASP Netherland and Foundation Updates
- 19:00 - 21:00 TBD - Youssef Oujamaa
- 20:00 - 20:15 break
- 20-15 - 21:00 Web Application Firewall, Filter and Bypass - Aatif Khan
- 21:00 - 21:30 Networking
Presentations
Youssef Oujamaa
TBD
Web Application Firewall, Filter and Bypass
This talk will take you through different features used by Web Application Firewall which make it more difficult for penetration testers during their testing. These controls block many of the automated tools and simple techniques used to discover flaws today. It will also give an overview on different filtering techniques and will explore how to determine the rule sets protecting the application. You'll be able to map out the rule sets and determine the specifics of how it detects attacks. After identifying the attacks, you will see how it can be bypassed.
Speakers
Youssef Oujamaa
TBD
Aatif Khan
Aatif Khan, cyber security researcher comes with over a decade of experience in information security. Apart from consulting on application security, he has also delivered infosec training's to corporate, defense personnel and cyber crime police officials. He has previously presented talk at OWASP Singapore, Malaysia, India and Dubai. He has also authored papers on Advance Persistence Threats, Hacking the Drones, Web Security 2.0, Android Application Penetration Testing.