This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Netherlands April 21st, 2016"
(→Youssef Oujamaa) |
(→Programme) |
||
Line 11: | Line 11: | ||
;[http://www.uva.nl/over-de-uva/de-uva-in-amsterdam/locaties/locaties/locaties/content/folder/binnenstad/universiteitsbibliotheek.html route] | ;[http://www.uva.nl/over-de-uva/de-uva-in-amsterdam/locaties/locaties/locaties/content/folder/binnenstad/universiteitsbibliotheek.html route] | ||
==Programme== | ==Programme== | ||
− | :18: | + | :18:30 - 19:00 Registration & Pizzas |
− | : | + | :19:00 - 19:15 OWASP Netherland and Foundation Updates |
− | :19: | + | :19:15 - 20:00 Securing REST APIs with SSL/TLS - Youssef Oujamaa |
:20:00 - 20:15 break | :20:00 - 20:15 break | ||
:20-15 - 21:00 Web Application Firewall, Filter and Bypass - Aatif Khan | :20-15 - 21:00 Web Application Firewall, Filter and Bypass - Aatif Khan |
Revision as of 16:40, 7 April 2016
April 21st, 2016
Venue
Universiteit van Amsterdam
- Universiteitsbibliotheek
- Singel 425, 1012 WP Amsterdam
- route
Programme
- 18:30 - 19:00 Registration & Pizzas
- 19:00 - 19:15 OWASP Netherland and Foundation Updates
- 19:15 - 20:00 Securing REST APIs with SSL/TLS - Youssef Oujamaa
- 20:00 - 20:15 break
- 20-15 - 21:00 Web Application Firewall, Filter and Bypass - Aatif Khan
- 21:00 - 21:30 Networking
Presentations
Securing REST APIs with SSL/TLS
What should be taken in consideration when you start using SSL/TLS.
Web Application Firewall, Filter and Bypass
This talk will take you through different features used by Web Application Firewall which make it more difficult for penetration testers during their testing. These controls block many of the automated tools and simple techniques used to discover flaws today. It will also give an overview on different filtering techniques and will explore how to determine the rule sets protecting the application. You'll be able to map out the rule sets and determine the specifics of how it detects attacks. After identifying the attacks, you will see how it can be bypassed.
Speakers
Youssef Oujamaa
TBD
Aatif Khan
Aatif Khan, cyber security researcher comes with over a decade of experience in information security. Apart from consulting on application security, he has also delivered infosec training's to corporate, defense personnel and cyber crime police officials. He has previously presented talk at OWASP Singapore, Malaysia, India and Dubai. He has also authored papers on Advance Persistence Threats, Hacking the Drones, Web Security 2.0, Android Application Penetration Testing.
Sponsors
- The OWASP Netherlands Chapter is sponsored by