This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP EEE Bucharest Event 2015 Agenda"
Oana Cornea (talk | contribs) |
Oana Cornea (talk | contribs) |
||
Line 73: | Line 73: | ||
This will be a (very) hands-on workshop where we will practice exercises as:<br> | This will be a (very) hands-on workshop where we will practice exercises as:<br> | ||
− | + | * Discover SQL injection and exploit it to extract information from the database<br> | |
− | + | * Find OS command injection and exploit it to execute arbitrary commands on the target server<br> | |
− | + | * Discover Cross-Site Scripting and exploit it to gain access to another user’s web session<br> | |
− | + | * Identify Local File Inclusion and exploit it to gain remote command execution<br> | |
− | + | * Find Cross-Site Request Forgery and exploit it to gain access to the admin panel<br> | |
− | + | * Other fun and challenging tasks<br> | |
Of course, we will also present safe ways in which the identified vulnerabilities can be eliminated or mitigated in a production environment.<br> | Of course, we will also present safe ways in which the identified vulnerabilities can be eliminated or mitigated in a production environment.<br> | ||
Intended audience: Web application developers, security testers, quality assurance personnel, people passionate about web security<br> | Intended audience: Web application developers, security testers, quality assurance personnel, people passionate about web security<br> | ||
'''Skill level''': Intermediate<br> | '''Skill level''': Intermediate<br> | ||
Requirements: - Laptop with a working operating system <br> | Requirements: - Laptop with a working operating system <br> | ||
− | + | * At least 2 GB of free disk space and at least 2 GB RAM<br> | |
− | + | * Administrative rights on the laptop<br> | |
− | + | * VMWare Player installed<br> | |
[http://www.eventbrite.com/e/owasp-top-10-vulnerabilities-from-discovery-to-complete-exploitation-tickets-18454393588 Register here] | [http://www.eventbrite.com/e/owasp-top-10-vulnerabilities-from-discovery-to-complete-exploitation-tickets-18454393588 Register here] |
Revision as of 19:47, 3 September 2015
Conference agenda | |||||
Time | Title | Speaker | Description | ||
10:00 - 10:30 (30 mins) |
Registration | ||||
10:30 - 10:45 (15 mins) |
Introduction & Welcome | Oana Cornea | Introduction to OWASP & Bucharest Event, Schedule for the Day | ||
10:45 - 11:30 (45 mins) |
|
| |||
11:50 - 12:35 (45 mins) |
|||||
12:55 - 13:40 (45 mins) |
|||||
13:40 - 14:30 (50 mins) |
Lunch/Coffee Break | ||||
14:30 - 15:15 (45 mins) |
|||||
15:20 - 16:05 (45 mins) |
|||||
16:10 - 16:55 (45 mins) |
Workshop | |||||
Time | Title | Trainers | Description | ||
9:00 - 14:00 (5 hours) Sala Albastra |
OWASP Top 10 vulnerabilities – from discovery to complete exploitation The purpose of this workshop is to increase the participants’ awareness on the most common web application vulnerabilities and their associated risks. We will discuss each type of vulnerability described in the OWASP Top 10 project and we will be practicing manual discovery and exploitation techniques. |
Adrian Furtună – Technical Manager – Security Services – KPMG Romania Ionuţ Ambrosie – Security Consultant – KPMG Romania |
Description: This will be a (very) hands-on workshop where we will practice exercises as:
Of course, we will also present safe ways in which the identified vulnerabilities can be eliminated or mitigated in a production environment.
|