This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP EEE Bucharest Event 2015 Agenda"

From OWASP
Jump to: navigation, search
Line 73: Line 73:
  
 
This will be a (very) hands-on workshop where we will practice exercises as:<br>
 
This will be a (very) hands-on workshop where we will practice exercises as:<br>
- Discover SQL injection and exploit it to extract information from the database<br>
+
* Discover SQL injection and exploit it to extract information from the database<br>
- Find OS command injection and exploit it to execute arbitrary commands on the target server<br>
+
* Find OS command injection and exploit it to execute arbitrary commands on the target server<br>
- Discover Cross-Site Scripting and exploit it to gain access to another user’s web session<br>
+
* Discover Cross-Site Scripting and exploit it to gain access to another user’s web session<br>
- Identify Local File Inclusion and exploit it to gain remote command execution<br>
+
* Identify Local File Inclusion and exploit it to gain remote command execution<br>
- Find Cross-Site Request Forgery and exploit it to gain access to the admin panel<br>
+
* Find Cross-Site Request Forgery and exploit it to gain access to the admin panel<br>
- Other fun and challenging tasks<br>
+
* Other fun and challenging tasks<br>
 
Of course, we will also present safe ways in which the identified vulnerabilities can be eliminated or mitigated in a production environment.<br>
 
Of course, we will also present safe ways in which the identified vulnerabilities can be eliminated or mitigated in a production environment.<br>
 
Intended audience: Web application developers, security testers, quality assurance personnel, people passionate about web security<br>
 
Intended audience: Web application developers, security testers, quality assurance personnel, people passionate about web security<br>
 
'''Skill level''': Intermediate<br>
 
'''Skill level''': Intermediate<br>
 
Requirements: - Laptop with a working operating system <br>
 
Requirements: - Laptop with a working operating system <br>
- At least 2 GB of free disk space and at least 2 GB RAM<br>
+
* At least 2 GB of free disk space and at least 2 GB RAM<br>
- Administrative rights on the laptop<br>
+
* Administrative rights on the laptop<br>
- VMWare Player installed<br>
+
* VMWare Player installed<br>
  
 
[http://www.eventbrite.com/e/owasp-top-10-vulnerabilities-from-discovery-to-complete-exploitation-tickets-18454393588 Register here]
 
[http://www.eventbrite.com/e/owasp-top-10-vulnerabilities-from-discovery-to-complete-exploitation-tickets-18454393588 Register here]

Revision as of 19:47, 3 September 2015


Conference agenda

Time Title Speaker Description
10:00 - 10:30
(30 mins)
Registration
10:30 - 10:45
(15 mins)
Introduction & Welcome Oana Cornea Introduction to OWASP & Bucharest Event, Schedule for the Day
10:45 - 11:30
(45 mins)


11:50 - 12:35
(45 mins)
12:55 - 13:40
(45 mins)
13:40 - 14:30
(50 mins)
Lunch/Coffee Break
14:30 - 15:15
(45 mins)
15:20 - 16:05
(45 mins)
16:10 - 16:55
(45 mins)

Workshop

Time Title Trainers Description
9:00 - 14:00
(5 hours)
Sala Albastra
OWASP Top 10 vulnerabilities – from discovery to complete exploitation
The purpose of this workshop is to increase the participants’ awareness on the most common web application vulnerabilities and their associated risks.

We will discuss each type of vulnerability described in the OWASP Top 10 project and we will be practicing manual discovery and exploitation techniques.

Adrian Furtună – Technical Manager – Security Services – KPMG Romania
Ionuţ Ambrosie – Security Consultant – KPMG Romania
Description:

This will be a (very) hands-on workshop where we will practice exercises as:

  • Discover SQL injection and exploit it to extract information from the database
  • Find OS command injection and exploit it to execute arbitrary commands on the target server
  • Discover Cross-Site Scripting and exploit it to gain access to another user’s web session
  • Identify Local File Inclusion and exploit it to gain remote command execution
  • Find Cross-Site Request Forgery and exploit it to gain access to the admin panel
  • Other fun and challenging tasks

Of course, we will also present safe ways in which the identified vulnerabilities can be eliminated or mitigated in a production environment.
Intended audience: Web application developers, security testers, quality assurance personnel, people passionate about web security
Skill level: Intermediate
Requirements: - Laptop with a working operating system

  • At least 2 GB of free disk space and at least 2 GB RAM
  • Administrative rights on the laptop
  • VMWare Player installed

Register here