OWASP EEE Bucharest Event 2015 Agenda
| 9:30 - 10:00
| 10:00 - 10:45
|From SCADA to IoT - Cyber Security||Bogdan Matache||The presentation dwells on the distinctive issues of cybersecurity in the world of Internet of Things (IoT). It starts with a short overview of the entities and trends of IoT: Industrial Control Systems (ICS), SCADA, consumer IoT, communication protocols and operating modes, threats and vulnerabilities for ICS / IoT. The presentation moves on to illustrating protection profiles, non-invasive penetration testing for ICS/IoT and finishes with a few consideration on building and operating a security operation center for SCADA / ICS / IoT.|
| 11:00 - 11:45
| XML Based Attacks
|| Daniel Tomescu
|| The presentation is focused on general and specific attack vectors in applications that use XML and additional technologies. The audience will learn how some of the OWASP Top 10 vulnerabilities can be reproduced using XML vectors, how XML External Entities can be used in order to read local files and how XML can be used in order to cause Denial of Service in vulnerable applications.|
| 12:00 - 12:45
|Dark appsec made simple||Alexander Antukh|| In this talk I would like to present results of my security research of applications in the "darknet" - a place where even low-risk vulnerabilities can become crucial for successful de-anonymization. We will go through different techniques of de-anonymizing subjects and will see that privacy is much harder topic than it appears to be. Finally, some vulnerabilities in real well-known services will be presented.|
| 12:55 - 13:40
|Attack is easy, let's talk defence. From threat modelling to intelligence driven defence.||Teodor Cimpoesu and Cosmin Anghel||Warfare is hard in asymmetric territories, and while cyber realm favours offence, defence is even harder. Modern cyber security talks about adversaries and threat actors, attack modelling and defence chain. But little information is about implementing these concepts. We propose to have a look at the modern approaches of taming security complexity by implementing intelligence driven defence in the day-to-day operations.|
| 13:40 - 14:30
| 14:30 - 15:15
|Your Intents are dirty, droid||Ionescu Razvan-Costin|| Analyzing the Inter-Process Communication mechanism and monitoring how applications communicate through intents is essential for the integrity of the Android system. |
Drozer is a comprehensive security attack framework for Android. It can analyse the Android’s Inter-Process Communication (IPC) mechanism and interact with the underlying operating system. Drozer also helps us to remotely exploit Android devices. At this moment Drozer doesn’t provide fuzzing testing on the intents in Android. This presentation aims to present a new Drozer module, “Fuzzinozer”, which allows us to send fuzzed intents to the applications installed on the Android device, analyse the system logcat and collect information based on which of the intents have generated crashes.
| 15:20 - 16:05
|Reversing the Apple Sandbox||Razvan Deaconescu|| Apple OSes (Mac OS X and iOS) use a variety of security mechanisms, one of which is sandboxing. Sandboxing uses kernel-based support to enforce strict operations for a given application. However,documentation for the Apple sandboxing is scarce and only few people have delved into its internals. |
In this talk we present the process of reversing Apple sandbox profiles allowing us to shed light into its inner workings, particulary for iOS. We base our work on previous work by Dionysus Blazakis and Stefan Esser and we extract information on the runtime sandboxing environment of iOS Apps.
| 16:10 - 16:55
|Catching up with today's malicious actors||Adrian Ifrim||Current approaches to cyber security do not respond adequately to changing technology or threat conditions. Repeated cyber intrusions into critical infrastructure demonstrate the need for improved cyber security. Traditional ways of protecting our networks are clearly not working anymore. This presentation will help you get a glimpse at what are your current solutions and what you need to expect from the future.|
| 9:00 - 14:00
| OWASP Top 10 vulnerabilities – from discovery to complete exploitation
The purpose of this workshop is to increase the participants’ awareness on the most common web application vulnerabilities and their associated risks.
We will discuss each type of vulnerability described in the OWASP Top 10 project and we will be practicing manual discovery and exploitation techniques.
| Adrian Furtună – Technical Manager – Security Services – KPMG Romania
Ionuţ Ambrosie – Security Consultant – KPMG Romania
This will be a (very) hands-on workshop where we will practice exercises as:
Of course, we will also present safe ways in which the identified vulnerabilities can be eliminated or mitigated in a production environment.
Seats available: 20 (first-come, first served)