Leeds UK

Leeds_UK

2011 Planned Meetings
June 22nd Manchester

September 21st Leeds

December 14th Manchester

Next Meeting
Date: Wednesday 23rd March in Leeds::: Please RSVP via the eventbrite link http://www.eventbrite.com/event/1429362261

Location: Brewery Taps, 18 New Station Street, Leeds, LS1 5DL - Map here http://www.brewerytapleeds.co.uk/contact.html

Schedule: 18:00 for 18:20 start

18:20-18:30

OWASP Chapter introduction. OWASP values and membership. Chapter information.

OWASP Leeds board member

18:30-19:10

Obfuscation Methods

Thomas Mackenzie

The talk is basically an overview of some research that I have recently been conducting in terms of obfuscation methods. It is my belief that pentesting should be used to simulate real world attacks so that not only application and infrastructure vulnerabilities are being found, but log management and sys admin level problems are found too. The talk isn’t technical – it is more about introducing methods on how this can work – I do talk about a few examples but I do not go into huge technical detail about it. I then go on to talk about a methodology that could work in terms of obfuscation methods – this is something that I think could be incorporated into the OWASP testing guide and I talk about that too.

19:15 - 20:00

DOM Sandboxing

''Gareth Heyes"

Can regular expressions create a secure sandboxing environment? Is it possible to protect JavaScript with just regular expressions? I will hopefully answer these questions and take you on my journey through regex hell and back into the light of regex heaven. I will then show you how to apply the techniques in a real world environment and share the challenges of allowing JavaScript to be executed on your site without creating XSS.

20:05-20:50

The Image that called me - Active Content Injection with SVG Files

''Mario Heiderich"

Scalable Vector Graphics are about to conquer the web. Unlike most of their raster based companions from the GIF, PNG and JPEG family, their vector based structure allows to display them on many different devices with various screen sizes without losing visual information. The open XML based SVG sources permit addition of meta data, helping even the visually impaired and blind to get the most out of these images. Additional modules, such as animations, events, SVG fonts, several scripting APIs and inclusion of hyper-links, other images and documents and even arbitrary content from cross-domain sources make SVG the perfect image format for the future WWW.

Nevertheless, a powerful standard such as SVG certainly poses a lot of risks. This presentation provides a close look at SVG from a security perspective. How can attackers abuse this mighty image format, which ways exist to execute script code and worse, and what should web developers and browser vendors consider when dealing with SVG. How will HTML5 change the way to work with SVGs and why does it matter for security professionals to know about things like SVG Tiny, in-line SVG, SVGz and other acronyms from a world where imaging and scripting collide? Besides many examples of malicious SVGs the talk will shed light on a novel filtering tool capable of filtering and sanitizing SVG images without loss of important content.

Past Events
2010 Dates

8th_December_Leeds

15th_September_Leeds

16th_june_Leeds

17th March - Leeds

2009 Dates

14th October 2009 - Leeds