This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Talk:Sydney

From OWASP
Revision as of 20:32, 28 February 2014 by Jmanico (talk | contribs) (Created page with "== Previous Meetings == {| ! align="left"| Type ! Date ! Duration (hours) |- |2014 Kickoff Meetup |5 February 2014 |2.0 |- |- |OSX Reversing Workshop |27 August 2013 |2.0 |-...")

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

Previous Meetings

Type Date Duration (hours)
2014 Kickoff Meetup 5 February 2014 2.0
OSX Reversing Workshop 27 August 2013 2.0
OSX Reversing Workshop 20 August 2013 2.0
OSX Reversing Workshop 15 August 2013 2.0
Meetup 14 August 2013 2.0
OSX Reversing Workshop 7 August 2013 2.0
Meetup 28 July 2010 2.0
Meetup 20 April 2010 2.0
Meetup 23 March 2010 2.0

Date: Wednesday, 28th July 2010

Presentations:

  • Robert Lee, PriceWaterHouse Coopers, Vulnerabilities & Google’s Jarlsberg Application
  • Alex Kouzemchenko, Azimuth Security, WAFs: How I love Thee.

Date: Tuesday, 20rd April 2010

Presentations:

Lightning Talks!

  • Louis Nyffenegger - ‘SQL injection in “order by” clauses’
  • Raphael Speyer – ECMAscript 5
  • Christian Heinrich - OWASP Top Ten 2010
  • Daniel Grzelak – Recon Tool Demonstration

Date: Tuesday, 23rd March 2010

Presentations:

  • PDF Hacking - Paul Theriault (Link TBA)
    The plan is to run an informal workshop style presentation with the following objectives:
    1. Provide an introduction to PDF format, scripting capabilities and other “features” you wouldn’t expect to see in a document format
    2. Learn some basic tools & techniques for analyzing malicious PDF files, for great justice
    3. Learn some basic tools & techniques for creating malicious PDF files, for great science
    4. Look at the security implications of PDFs and what can be done in an enterprise environment to reduce these risks (uninstall Reader?)
  • Incident Case Study - Charles Carmakal (Link TBA)
    Review of the security breach landscape in the US and go through an interesting case study. It involved organised criminals from eastern Europe, over $100M of losses, and incredible sophistication. The initial point of entry for this breach was the web - SQL injection, linked databases, privilege escalation, development/deployment of custom malware.