This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Royal Holloway"

From OWASP
Jump to: navigation, search
(Talks)
 
(43 intermediate revisions by 2 users not shown)
Line 1: Line 1:
{{Chapter Template|chaptername=Royal Holloway University of London|extra=The chapter leaders are [mailto:[email protected] Dennis Groves] and [mailto:[email protected] Dinis Cruz].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-royalholloway|emailarchives=http://lists.owasp.org/pipermail/owasp-royalholloway}}
+
{{Inactive Chapter}}
  
== Local News ==
+
__NOTOC__
  
'''Meeting Location'''
+
= Welcome =
 +
{{Chapter Template|chaptername=Royal Holloway University of London|extra=The chapter leader position is OPEN.|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-royalholloway|emailarchives=http://lists.owasp.org/pipermail/owasp-royalholloway}}
 +
 
 +
= Next Event =
 +
 
 +
 
 +
=== Thurs 6 Dec 6:30-9pm ===
 +
 
 +
OWASP Winter Holiday Social @ Crosslands in the Founder's Building, near reception.
 +
 
 +
'''Meeting Location''':
 +
Royal Holloway University of London, Bourne Lecture Theatre 2, Egham Hill, Egham, TW20 0EX
 +
 
 +
Directions to Royal Holloway and a Campus Plan are available from the following [http://www.rhul.ac.uk/aboutus/locationmap/home.aspx website] (Bourne LT 2 is in building 31 on the Campus Plan).
  
 
Everyone is welcome to join us at our chapter meetings.
 
Everyone is welcome to join us at our chapter meetings.
  
  
== Next Meeting/Event(s)  ==
+
= Future Events =
 +
 
 +
 
 +
=== date and time place holder ===
 +
 
 +
'''Talks''':
 +
'''Speakers''':
  
 +
= Past Events =
  
== Future Events ==
+
=== Thurs 8 Nov 6:30-9pm ===
  
 +
'''Talks''':
 +
* DoS Mitigation - Christiaan Ehlers
 +
* Confessions of A PCI Consultant & IPADS - Ken Ferris
  
== Past Events ==
+
'''Speakers''':
 +
Christiaan Ehlers, Ken Ferris
  
=== Thursday, March 8th 2012, 18:30-21:00 (Royal Holloway) ===
+
=== Thurs 10 May 6:30-9pm ===
  
==== Location ====
+
'''Talks''':
 +
* [http://www.websecurify.com WebScurify] - Petko Petkov (pdp)
 +
* Your Digital Exhaust: How your online habits might cause more damage than you realised. - Daniel Cuthbert
 +
* [http://diniscruz.blogspot.co.uk/2012/04/making-security-invisible-by-becoming.html Making Security Invisible by Becoming the Developer's Best Friends] - ([https://www.owasp.org/index.php/User:Dinis_Cruz Dinis Cruz])
  
:Royal Holloway University of London, Bourne Lecture Theatre 2, Egham Hill, Egham, TW20 0EX
+
'''Speakers''':  
 +
Daniel Cuthbert, Petko Petkov, ([https://www.owasp.org/index.php/User:Dinis_Cruz Dinis Cruz])
  
==== Talks ====
+
=== Thursday, March 8th 2012, 18:30-21:00 (Royal Holloway) ===
  
*''Implementing cryptography: good theory vs. bad practice - Viet Pham (PDF)
+
'''Talks''':
 +
*''Implementing cryptography: good theory vs. bad practice - Viet Pham ([[https://www.owasp.org/images/c/c5/OwaspTalkMarch.pdf PDF]])
 
:Abstract: Cryptography is being widely implemented in software to provide security features. The main reason is that, many cryptographic mechanisms are mathematically proven secure, or trusted secure given some mathematical reasoning. However, to take full advantages of these mechanisms, they must be implemented strictly according to the theoretical models, e.g., several cryptographic mechanisms must be used together, in a specific manner to provide a desired security goal. However, without strong cryptographic background, many software developers tend to deviate from these models, thus making their own security software a gold mine for attackers. This talk gives examples to show why such situations exist, where do they spread, and how bad they may turn into.
 
:Abstract: Cryptography is being widely implemented in software to provide security features. The main reason is that, many cryptographic mechanisms are mathematically proven secure, or trusted secure given some mathematical reasoning. However, to take full advantages of these mechanisms, they must be implemented strictly according to the theoretical models, e.g., several cryptographic mechanisms must be used together, in a specific manner to provide a desired security goal. However, without strong cryptographic background, many software developers tend to deviate from these models, thus making their own security software a gold mine for attackers. This talk gives examples to show why such situations exist, where do they spread, and how bad they may turn into.
  
*''Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and and Pinning of Certs - Tobias Gondrom
+
*''Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and and Pinning of Certs - ([https://www.owasp.org/index.php/User:Tgondrom Tobias Gondrom]) ([[http://www.gondrom.org/owasp/presentations/OWASP_defending-MITMA_RHUL.pdf PDF]])
 
:"In the recent months major trusted CAs providing trusted certificates for SSL/TLS in browser scenarios were compromised (e.g. seen in the Diginotar breach) and based on the current trust models (trusting all registered CAs equally for all domains) exposed vital web applications to the risk of man-in-the-middle attacks. Several approaches are currently discussed to mitigate this risk. The most advanced and closest to final adoption being the technologies discussed by the browser vendors at the recent IETF meeting in November in Taipei: HSTS and pinning of certificates. To better protect content providers against the distribution of bogus certificates, an HTTP header extension containing a fingerprint of their certificates linked to a domain address has been defined. This approach, which has been partly tested in Chrome, and already helped identify and protect to some extend Google's web application in the recent Diginotar compromise. Chrome users were able to detect the bogus DigiNotar certificates because Chrome had embedded the hashes of valid Google certificates. Back in July, the hacked DigiNotar certificate authority (CA), which has since gone out of business, was used to issue more than five hundred bogus certificates for companies including Google and various intelligence services."
 
:"In the recent months major trusted CAs providing trusted certificates for SSL/TLS in browser scenarios were compromised (e.g. seen in the Diginotar breach) and based on the current trust models (trusting all registered CAs equally for all domains) exposed vital web applications to the risk of man-in-the-middle attacks. Several approaches are currently discussed to mitigate this risk. The most advanced and closest to final adoption being the technologies discussed by the browser vendors at the recent IETF meeting in November in Taipei: HSTS and pinning of certificates. To better protect content providers against the distribution of bogus certificates, an HTTP header extension containing a fingerprint of their certificates linked to a domain address has been defined. This approach, which has been partly tested in Chrome, and already helped identify and protect to some extend Google's web application in the recent Diginotar compromise. Chrome users were able to detect the bogus DigiNotar certificates because Chrome had embedded the hashes of valid Google certificates. Back in July, the hacked DigiNotar certificate authority (CA), which has since gone out of business, was used to issue more than five hundred bogus certificates for companies including Google and various intelligence services."
  
==== Speakers ====
 
 
Tobias Gondrom, Viet Pham
 
  
 +
'''Speakers''':
 +
([https://www.owasp.org/index.php/User:Tgondrom Tobias Gondrom]), Viet Pham
  
 
=== Thursday, February 2nd 2012 ,18:30-21:00 ===
 
=== Thursday, February 2nd 2012 ,18:30-21:00 ===
  
'''Location''': Royal Holloway University of London, Bourne Lecture Theatre 2, Egham Hill, Egham, TW20 0EX
+
'''Talks''':
 
+
*''Security as Pollution (lessons learned)'' - ([https://www.owasp.org/index.php/User:Dinis_Cruz Dinis Cruz])
'''Speakers''': Sarah Baso, Dinis Cruz, Dennis Groves
 
 
 
*''Security as Pollution (lessons learned)'' - Dinis Cruz
 
 
*:Based on David Rice's "Upon the Threshold of Opportunity" presentation at the OWASP AppSec USA 2010
 
*:Based on David Rice's "Upon the Threshold of Opportunity" presentation at the OWASP AppSec USA 2010
  
*''Making Security Invisible by Becoming the Developer's Best Friends'' - Dinis Cruz
+
*''Making Security Invisible by Becoming the Developer's Best Friends'' - ([https://www.owasp.org/index.php/User:Dinis_Cruz Dinis Cruz])
 
*:Based on Dinis' presentation at OWASP AppSec Brazil 2011
 
*:Based on Dinis' presentation at OWASP AppSec Brazil 2011
  
*''How to get a job in AppSec by Hacking and fixing TeamMentor'' - Dinis Cruz and Dennis Groves
+
*''How to get a job in AppSec by Hacking and fixing TeamMentor'' - ([https://www.owasp.org/index.php/User:Dinis_Cruz Dinis Cruz]) and ([https://www.owasp.org/index.php/User:Dennis_Groves Dennis Groves])
 
*:This is for students and developers who want to get into the application security space and need to have/show real-world experience.
 
*:This is for students and developers who want to get into the application security space and need to have/show real-world experience.
  
*''What's Happening on OWASP Today'' - Sarah Baso
+
*''What's Happening on OWASP Today'' - ([https://www.owasp.org/index.php/User:Sarah_Baso Sarah Baso])
 
*:This is an overview of the multiple activities that are currently happening around the world at OWASP presented by one of OWASP's employees currently focused on logistics, community and empowerment
 
*:This is an overview of the multiple activities that are currently happening around the world at OWASP presented by one of OWASP's employees currently focused on logistics, community and empowerment
 +
 +
'''Speakers''':
 +
([https://www.owasp.org/index.php/User:Sarah_Baso Sarah Baso]), ([https://www.owasp.org/index.php/User:Dinis_Cruz Dinis Cruz]), ([https://www.owasp.org/index.php/User:Dennis_Groves Dennis Groves])
  
 
=== Thursday, September 8th 2011 ===
 
=== Thursday, September 8th 2011 ===
  
'''Location''': Royal Holloway University of London, Bourne Lecture Theatre 2, Egham Hill, Egham, TW20 0EX
+
'''Talk''':  
 +
Doing it for the Lulz: Why Lulzsec has shown us to be an ineffective industry.
  
'''Speaker''': Daniel Cuthbert ([http://prezi.com/ylfkkek0vb-r/all-aboard-the-lulz-boat/ deck])
+
'''Speaker''':  
 
+
Daniel Cuthbert ([http://prezi.com/ylfkkek0vb-r/all-aboard-the-lulz-boat/ deck])
'''Title''': Doing it for the Lulz: Why Lulzsec has shown us to be an
 
ineffective industry.
 
  
 
'''Bio''':  Daniel Cuthbert is one of the Open Web Application Security
 
'''Bio''':  Daniel Cuthbert is one of the Open Web Application Security
Line 68: Line 95:
 
the development life cycle is secure and the overall application can
 
the development life cycle is secure and the overall application can
 
withstand today’s hackers.
 
withstand today’s hackers.
 
Directions to Royal Holloway and a Campus Plan are available from the following [http://www.rhul.ac.uk/aboutus/locationmap/home.aspx website] (Bourne LT 2 is in building 31 on the Campus Plan).
 
  
 
=== Friday, June 3rd 2011 ===
 
=== Friday, June 3rd 2011 ===
 +
'''Talk''':
 +
*'''Wordpress Security''' ([[Media:Wordpress-security-ext.pdf|PDF]])
 +
:Wordpress is one if the most popular blogging systems in the world but is routinely used to shoehorn complex sites into a blog shaped box, often because of it's flexibility and ease of use. In this talk, Mandalorian's Steve Lord discusses common Wordpress security snafus and how to avoid them.
  
'''Location''': Royal Holloway University of London, Room BLT2, Egham Hill, Egham, TW20 0EX
+
'''Speaker''': Steve Lord
 
 
*'''Wordpress Security - Steve Lord''' ([[Media:Wordpress-security-ext.pdf|PDF]])
 
*:Wordpress is one if the most popular blogging systems in the world but is routinely used to shoehorn complex sites into a blog shaped box, often because of it's flexibility and ease of use. In this talk, Mandalorian's Steve Lord discusses common Wordpress security snafus and how to avoid them.
 
  
 +
<headertabs />
  
 
[[Category:OWASP Chapter]]
 
[[Category:OWASP Chapter]]
 
[[Category:United Kingdom]]
 
[[Category:United Kingdom]]

Latest revision as of 22:59, 10 July 2015

This OWASP Chapter is inactive.  If you are interested in restarting this Chapter contact us for more information or apply to restart this chapter .



OWASP Royal Holloway University of London

Welcome to the Royal Holloway University of London chapter homepage. The chapter leader position is OPEN.


Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter. Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG


Thurs 6 Dec 6:30-9pm

OWASP Winter Holiday Social @ Crosslands in the Founder's Building, near reception.

Meeting Location: Royal Holloway University of London, Bourne Lecture Theatre 2, Egham Hill, Egham, TW20 0EX

Directions to Royal Holloway and a Campus Plan are available from the following website (Bourne LT 2 is in building 31 on the Campus Plan).

Everyone is welcome to join us at our chapter meetings.


date and time place holder

Talks: Speakers:

Thurs 8 Nov 6:30-9pm

Talks:

  • DoS Mitigation - Christiaan Ehlers
  • Confessions of A PCI Consultant & IPADS - Ken Ferris

Speakers: Christiaan Ehlers, Ken Ferris

Thurs 10 May 6:30-9pm

Talks:

Speakers: Daniel Cuthbert, Petko Petkov, (Dinis Cruz)

Thursday, March 8th 2012, 18:30-21:00 (Royal Holloway)

Talks:

  • Implementing cryptography: good theory vs. bad practice - Viet Pham ([PDF])
Abstract: Cryptography is being widely implemented in software to provide security features. The main reason is that, many cryptographic mechanisms are mathematically proven secure, or trusted secure given some mathematical reasoning. However, to take full advantages of these mechanisms, they must be implemented strictly according to the theoretical models, e.g., several cryptographic mechanisms must be used together, in a specific manner to provide a desired security goal. However, without strong cryptographic background, many software developers tend to deviate from these models, thus making their own security software a gold mine for attackers. This talk gives examples to show why such situations exist, where do they spread, and how bad they may turn into.
  • Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and and Pinning of Certs - (Tobias Gondrom) ([PDF])
"In the recent months major trusted CAs providing trusted certificates for SSL/TLS in browser scenarios were compromised (e.g. seen in the Diginotar breach) and based on the current trust models (trusting all registered CAs equally for all domains) exposed vital web applications to the risk of man-in-the-middle attacks. Several approaches are currently discussed to mitigate this risk. The most advanced and closest to final adoption being the technologies discussed by the browser vendors at the recent IETF meeting in November in Taipei: HSTS and pinning of certificates. To better protect content providers against the distribution of bogus certificates, an HTTP header extension containing a fingerprint of their certificates linked to a domain address has been defined. This approach, which has been partly tested in Chrome, and already helped identify and protect to some extend Google's web application in the recent Diginotar compromise. Chrome users were able to detect the bogus DigiNotar certificates because Chrome had embedded the hashes of valid Google certificates. Back in July, the hacked DigiNotar certificate authority (CA), which has since gone out of business, was used to issue more than five hundred bogus certificates for companies including Google and various intelligence services."


Speakers: (Tobias Gondrom), Viet Pham

Thursday, February 2nd 2012 ,18:30-21:00

Talks:

  • Security as Pollution (lessons learned) - (Dinis Cruz)
    Based on David Rice's "Upon the Threshold of Opportunity" presentation at the OWASP AppSec USA 2010
  • Making Security Invisible by Becoming the Developer's Best Friends - (Dinis Cruz)
    Based on Dinis' presentation at OWASP AppSec Brazil 2011
  • How to get a job in AppSec by Hacking and fixing TeamMentor - (Dinis Cruz) and (Dennis Groves)
    This is for students and developers who want to get into the application security space and need to have/show real-world experience.
  • What's Happening on OWASP Today - (Sarah Baso)
    This is an overview of the multiple activities that are currently happening around the world at OWASP presented by one of OWASP's employees currently focused on logistics, community and empowerment

Speakers: (Sarah Baso), (Dinis Cruz), (Dennis Groves)

Thursday, September 8th 2011

Talk: Doing it for the Lulz: Why Lulzsec has shown us to be an ineffective industry.

Speaker: Daniel Cuthbert (deck)

Bio: Daniel Cuthbert is one of the Open Web Application Security Project Leaders and the Assessment manager for SensePost. He has been researching, and involved, with web application security since the late 90’s and has worked on a wide range of projects to ensure that the development life cycle is secure and the overall application can withstand today’s hackers.

Friday, June 3rd 2011

Talk:

  • Wordpress Security (PDF)
Wordpress is one if the most popular blogging systems in the world but is routinely used to shoehorn complex sites into a blog shaped box, often because of it's flexibility and ease of use. In this talk, Mandalorian's Steve Lord discusses common Wordpress security snafus and how to avoid them.

Speaker: Steve Lord