Belgium

Local News
The OWASP Day was great! Nice location, loaded agenda. Most of the presentations are online now.

The next Belgium Chapter meeting is on November 20. Suggestions for speakers and location are welcome.

We would also love to set up a first Luxembourg chapter meeting in October: host sponsor, speaker & topic suggestions are welcome!

Chapter Board
The BeLux Chapter is now supported by an active board: Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects.
 * Erwin Geirnaert, Zion Security
 * Philippe Bogaerts, NetAppSec
 * André Mariën, Cybertrust
 * Lieven Desmet, K.U.Leuven
 * Joël Quinet, Unisys
 * Sebastien Deleersnyder, Telindus

Structural Sponsors 2007
OWASP BeLux would like to thank the following organizations for sponsoring this chapter. If you are interested in sponsoring the BeLux chapter please contact seba 'at' deleersnyder.eu.

https://www.owasp.org/images/7/7e/50px-F5_50px.jpg

WHEN
Tuesday, November 20th, 2007 (19-21pm)

WHERE
tbd

PROGRAM
The agenda looks as follows:

tbd

REGISTRATION
Please send a mail to belgium 'at' owasp.org if you plan to attend, so we can size the venue appropriately and keep you updated on last-minute changes.

Previous Event: OWASP Day (6-Sep-2007)
On September 6th, OWASP organized OWASP Day conferences worldwide triggered by the Global Security Week idea.

In Belgium we organized the mini-conference in Brussels.

Speakers:
 * Mark Curphey, OWASP Founder, (Marc's blog)
 * Petko D. Petkov, a.k.a pdp (architect), founder of the GNUCITIZEN group. Co-author of the “XSS Attacks” book.
 * Bart De Win, postdoc researcher within the DistriNet research group, K.U.Leuven
 * David Kierznowski, founder of blogsecurity.net and active member of the GNUCITIZEN group.
 * Simon Roses Femerling, Security Technologist at ACE Team Microsoft
 * Luc Beirens, FCCU

WHEN
Thursday, September 6th, 2007 (2-7pm)

WHERE
Telindus, Belgacom ICT sponsored the venue:  Location: SURF House, Rue Stroobants 51, 1140 Evere.  You can find a map and itinary online. 

PROGRAM
The theme of the world-wide OWASP Day is “Privacy in the 21st Century”.

The event started with an introductory session on WebGoat & WebScarab at 12h30, the mini-conference itself at 14h.

The agenda:


 * 12h30 pre-event: Getting started with WebGoat & WebScarab (Erwin Geirnaert)
 * 14h00 Welcome & pre-recorded video of OWASP board (Sebastien Deleersnyder)
 * 14h20 Key note:OWASP Evaluation and Certification Criteria Draft (Mark Curphey)
 * 15h10 Automated Web FOO or FUD? (David Kierznowski)
 * 16h00 OWASP Pantera Unleashed (Simon Roses Femerling)
 * 16h40 Break
 * 17h00 CLASP, SDL and Touchpoints Compared (Bart De Win)
 * 17h25 Threats of e-insecurity in Belgium and the Belgian response (Luc Beirens - FCCU)
 * 17h50 For my next trick... hacking Web2.0 (pdp)
 * 18h40 Panel Discussion: “Privacy in the 21st Century?”, moderator: André Marien (Verizon Business - Cybertrust)
 * 19h30 Finish - Drinks !

Getting started with WebGoat & WebScarab (Erwin Geirnaert)
Download presentation.

In this tutorial you will learn how to use WebScarab to solve the lessons in WebGoat.

Following points will be explained:
 * Configure WebScarab as a local proxy
 * Intercepte HTTP requests and responses
 * Modify HTTP requests to solve the lesson “Hidden field manipulation”
 * Modify HTTP responses to solve the lesson “Bypass client-side Javascript validation”
 * Use the session analysis tab in WebScarab
 * Use the web services tab in WebScarab
 * Use WebScarab to analyze Ajax XML messages

!! Prerequisites:
 * Bring your own laptop with you!
 * Download WebScarab onto your laptop
 * Download WebGoat onto your laptop

Erwin Geirnaert is CEO and co-founder of ZION Security. He is a renowned application security expert and has presented on various conferences like Javapolis, Eurostar, Owasp,… about web security. He is board member of OWASP Belux and actively involved in various OWASP projects like OWASP Java and OWASP WebGoat. Because of his technical experience he loves to do security testing, code review, reverse engineering,.. for Fortune 1000 companies in Europe. More information can be found on his LinkedIn profile: http://www.linkedin.com/in/erwingeirnaert.

OWASP Evaluation and Certification Criteria Draft (Mark Curphey)
As opposed to me continuing saying what’s wrong with PCI DSS, it seems to me that OWASP is a perfect forum to simply create and publish a “better criteria”. This can either be adopted and implemented by an organization like OWASP or considered to be incorporated into the PCI or other security standards. We won't get bogged down in the politics up-front, but hold something good up to the world for people to adopt. This project would of course draw on and bring together many of the other OWASP Projects including the Guide (What is a secure web app), Testing Guides (How to test for a secure web app), WebGoat (part of how to certify an individual understands and can find web app issues) etc. Many of those projects may not be complete or a perfect fit today, but this project can bring a common connecting theme to a lot of very valuable IP that OWASP has built over the years. I will also create it in such as way that a corporate could adopt/adapt it themseles as well as an industry. Where other OWASP projects are not complete or currently suitable I will build a requirements doc that can be considered by those teams if they feel appropriate.

Mark Curphey ran Foundstone consulting from 2003 until late 2006 during which time the company was sold to McAfee. Before joining Foundstone Mark was the Director of Information Security at Charles Schwab (responsible for the software security program) and has also worked for ISS and several financial services companies in Europe. Mark has a Masters degree in information security from Royal Holloway, University of London and was the original founder of the Open Web Application Security Project (OWASP).

Automated Web FOO or FUD? (David Kierznowski)
We take a look into automated web application testing technologies and their effectiveness against real life applications.

Also, we look into one of GNUCITIZENs latest projects, The Technika Security Framework (TSF), which will enable users to automate security testing directly from their browser.

David Kierznowski currently works as a Senior Security Analyst for a leading penetration testing company in the UK. He has worked in the security industry for the past 6 years. David is also the founder of both michaeldaw.org and blogsecurity.net and is an active member of the GNUCITIZEN group.

OWASP Pantera Unleashed (Simon Roses Femerling)
The presentation will provide a glimpse into what Pantera can offer when performing blackbox web assessments. In the age of Web 2.0 we need powerful tools that provide us rich and accurate information and allows us to manipulate that information into our advantage, that's what Pantera is all about.

Simon Roses Femerling is a Security Technologist at the ACE Team at Microsoft. Former PwC and @Stake. He has many years of security experience where he has authored and cooperated in several security Open Source projects and advisories. Simon is natural from wonderful Mallorca Island in the Mediterranean Sea. He holds a postgraduate in E-Commerce from Harvard University and a B.S. from Suffolk University at Boston, Massachusetts.

CLASP, SDL and Touchpoints Compared (Bart De Win)
Over the years, specific methodologies and techniques for secure software engineering have been proposed, yet dedicated processes have become available only recently. In this presentation, the highlights of an activity-driven comparison of three high-profile processes for the development of secure software are presented.

Bart De Win is a postdoctoral researcher in the research group DistriNet, Department of Computer Science at the Katholieke Universiteit Leuven. His research interests are in secure software engineering, including software development processes, aspect-oriented software development and model driven security.

Threats of e-insecurity in Belgium and the Belgian response (Luc Beirens, FCCU)
The presentation will give a short overview of the actual threats on the e-society in Belgium. How are public and private sector organized (or not) to tacle the different problems ? What are the tasks of the police within this framework ?

Since 1991, chief superintendent Luc Beirens is engaged in computer forensics and cyber crime investigations. He is head of the Federal Computer Crime Unit of the Federal Police since 2001. Aside consulting his detectives in current cyber crime investigations, he is responsible for the reorganization, the equipment and the training of Belgian police services concerned with cyber crime investigations. As member of the European Working Party on Information Technology Crime (EWPITC) of Interpol since 1995 and the EUROPOL cyber crime expert group since 2001, he has cooperated in writing several documents concerning computer forensics and cyber crime investigations. He lectures in these fields at several police academies and universities. His is involved in several organizations and platforms that are concerned with e-security, ICT forensics and cyber crime combating. Before his detective career, he has worked from 1987 till 1995 as analyst and project manager on the development of the Police Information System of the Belgian Gendarmerie. He holds master degrees in criminology and information technology.

For my next trick... hacking Web2.0 (pdp)
Web2.0, if I can summarize it with a few simple words, is all about communication, distribution, information, agents, clients and servers. Those who understand the 2.0 fundamentals have the power to manipulate the global Web to suit their needs - hackers, the new digital breed of the 2.0 world. Web2.0 hacking is a mean for communicating and distributing critical information in a better way. It can be used to build ghost infrastructures from where to launch attacks - anonymously, no traces, nothing. Web2.0 hacking is also about the thin line between client-side and server-side security. It is about the endpoints and the electronic highways. It is about reaching the masses and yet being able to perform attacks on specific targets. Web2.0 hacking is also about distribution and influence, covert channels, bots, IA, ghosts inside the electronic frame. Web2.0 hacking is also a movement, a cyber subculture where individuals show their technical abilities, and understandings of the world and use that to manipulate their way through the system.

Web2.0 hacking practices should never be related to AJAX and JavaScript exploitation techniques only. Although it is true that client-side security has a significant part of the Web2.0 ecosystem, it is important to realize its role. There are far too many other aspects that we need to look into. My aim is to cover these aspects and reveal the hidden dangers.

Petko D. Petkov, a.k.a pdp (architect), is the founder and leading contributer of the GNUCITIZEN group. He is a senior IT security consultant based in London, UK. His day-to-day work involves identifying vulnerabilities, building attack strategies and creating attack tools and penetration testing infrastructures. Petko is known in the underground circles as pdp or architect but his name is well known in the IT security industry for his strong technical background and creative thinking. He has been working for some of the world's top companies, providing consultancy on the latest security vulnerabilities and attack technologies.

REGISTRATION
Please send a mail to belgium 'at' owasp.org if you plan to attend, so we can size the venue appropriately and keep you updated on last-minute changes.

Past Events

 * Events held in 2007
 * Events held in 2006
 * Events held in 2005