Cairo

Local News
--- ---

OWASP Cairo Chapter in the CIT's Second Anual Cyber Security Event
---

For the second year, OWASP Cairo chapter is participating in the CIT information Security event Event Agenda http://login.qsend.it/t/r-l-yuflya-dktihhjddj-r/.

Event Registration link: http://login.qsend.it/t/r-l-yuflya-dktihhjddj-o/

Location: Intercontinental City Stars, Al saraya Hall, Nasr City, Cairo, EGYPT

Date: 27 March 2017

OWASP Session:  Web and Mobile applications Advanced User Tracking (45 min) [By: Mohamed Alfateh]

--- ---

OWASP Top 10 Awareness Program
---

Day 2: Broken Authentication and Session Management  Application functions related to authentication and session management are often not implemented correctly, allowing attackers to compromise passwords, keys, or session tokens, or to exploit other implementation flaws to assume other users’ identities. The "Broken Authentication and Session Management" day includes three sessions covering the relevent web attacks and attacks mitigation.

Location: ITI Information Technology Institute - Smart Village - Building, B148, - km 28, Cairo-Alexandria Desert Road, Cairo, Egypt

Date: 24 December 2016

Day Sessions:  1- Introduction to OWASP top 10 (45 min) [By: Mohamed Alfateh] 2- Broken Authentication and Session Management Attacks (45 min) [By: Ahmed Alaa] 3- Broken Authentication and Session Management Attacks Demos (30 min) [By: Ahmed Alaa] 4- Broken Authentication and Session Management Attacks Mitigation (45 min) [By: Mohamed Alfateh]

--- ---

OWASP Cairo Chapter in Bluekaizen CSCamp 18 Nov. 2016


These sessions are served in the way of First Come First Served. The room has a limitation of 50 persons only. If you are interested to attend please try to be there before the first OWASP session start by a good amount of time.

Location: Intercontinental City Stars, Al saraya Hall, Nasr City, Cairo, EGYPT

Date: Friday, November 18th, 2016 05:00 PM until 07:00 PM

Event Agenda:  The Hidden Venom : Dangerous Formats (By: Fady Othman)

In the past years, we have seen the development of client-side attacks and how hackers became smarter and smarter. We came to a realization that you don't really need a zero day or advanced exploit to spread a malware or ransomware. all what you need is a good social engineering trick and the knowledge of how to abuse a legitimate file format. In this talk, we will have a look at seemingly non-harmful file formats and how they can be abused to spread malware.

Exploiting PHP Serialized Objects for Authentication bypass (By: Ebrahim Hegazy) In this session, I will talk about PHP Serialized Objects as following: 1- What is PHP Serialized/Unserialize Objects and how it works, 2- Demo Code on PHP Serialized Objects, 3- Exploitation scenarios for Serialized Objects, 4- Practical example of exploiting Serialized Objects for Authentication bypass & Privilege Escalation.

The Hidden Venom : Detecting APTs at web application layer (By: Mohamed Alfateh)

Detecting  and   defending   against   Multi - Stage  Advanced  Persistent  Threats  (APT)  Attacks  is a  challenge  for  mechanisms  that   are   static  in   its   nature   and   are based   on  blacklisting  and  malware  signature techniques. The comprehensive analysis and correlation can discover behavior indicative of APT-related attacks and data exfiltration. In the web application layer, other techniques are used to detect the sophisticated web attacks. In this presentation, we will discuss some techniques that could be used to deal with the APTs in the web application layer.

--- ---

OWASP Cairo Chapter in FIRST Regional Symposium for Arab and African Regions, November 2nd 2016
OWASP Cairo chapter will be a main contributor to FIRST regional symposium for Arab and African Regions that will be held in Egypt on the 2nd and 3rd of November in the city of Sharm ElSheikh. https://www.first.org/events/symposium/egypt2016

--- ---

OWASP Top 10 Awareness Program
For those of you who missed our OWASP top 10 injection day, you get a second chance to attend it.

We will be running the sessions again as a webinar next Thursday (1/9/2016) at 6 pm Cairo time.

The registration link for the webinar is

https://attendee.gotowebinar.com/register/4323912316534772740

Hope to see you then. Have a great day

Day 1: Injection Day  Injection is an entire class of attacks that rely on injecting data into a web application in order to facilitate the execution or interpretation of malicious data in an unexpected manner. Examples of attacks within this class include Cross-Site Scripting (XSS), SQL Injection, Header Injection, Log Injection and Full Path Disclosure. I’m scratching the surface here.

This class of attacks is every programmer’s bogeyman. They are the most common and successful attacks on the internet due to their numerous types, large attack surface, and the complexity sometimes needed to protect against them. The injection day includes three sessions covering the Injection Attacks and Mitigations,

Location: Abbas Al-Akkad St., Madinet Nasr, Cairo, Egypt

Date: 20 August 2016

Day Sessions:  1- Introduction to Injection Attacks (45 min) [By: Hassan Mohamed] 2- Advanced Techniques for Injection Attacks (45 min) [By: Fady Othman] 1- Injection Attacks Mitigations (45 min) [By: Ahmed Saafan]

--- ---

OWASP Cairo Chapter in the CIT's Second Anual Cyber Security Event


 Event Presentations: Hunting for the bad guys Software Security Assurance

 Registration Details: The registration is not mandatory, please visit the event website for more details: http://cit-fei.org/en/Page/sc/security-conference The Attendance will be free of charge without need for conference ticket,

These sessions are served in the way of First Come First Served. The room has a limitation of 100 persons only. If you are interested to attend please try to be there before the session start by a good amount of time.

Location: Fairmont Hotel, Heliopolis, El Orouba Street, 11736, Cairo, EGYPT

Date: Monday, May 30, 2016 at 7:00 PM Tuesday, May 31, 2016 at 10:00 PM

Event Agenda:  Software Security Assurance (By: Nadim Barsoum)

Implementing a software security assurance program can be a daunting task that can leave program managers and consultants equally overwhelmed. In this talk we discuss the main building blocks of a software security assurance program and suggest light-weight methods for jump-starting your program with a focus on assurance activities and their relating governance aspects.

BIO:

Nadim Barsoum is a senior software security consultant who has worked for 13 years in the software industry, focused on the IT compliance needs of governmental institutions, private sector enterprises and banks. Nadim has helped organisations around the globe to plan, resource and initiate their Software Security Assurance programs, enabling them to realize the full potential of a structured, measurable approach to risk management and mitigation. By drawing upon a vast set of experiences in a variety of industries and environments, he has custom-tailored programs to meet the specific needs of clients, ensuring they realise the optimum return on their investments.

Hunting for the bad guys (By: Hassan Mourad)

Recently, a new breed of security solutions appeared in the market, Sandbox based Antimalware solutions, promissing to be the answer to advanced malware and APTs.

Yet, as always, there are ways to circumvent any control. In this presentation we will examin a new technique to bypass sandbox based solutions, allowing malware to avoid detection and giving it a free pass to your network.

--- ---

OWASP Cairo Chapter in IEEE MSB Event 29-30 Aprl 2016


Location: Moustafa Elnaggar Streat - Shebin Elkom، Monofia, EGYPT

Date: Friday, April 29th, 2016 and Saturday, April 30th, 2016 09:00 AM until 05:00 PM

OWASP Sessions:  1- Game Development (90 min) 2- Exploit Writing Fundamental (90 min)

--- ---

Application security Training for ITI Cyber security students


Location: ITI building - Smart Village، Giza, EGYPT

Date: Wednesday, March 16th, 2016 and Friday, March 18th, 2016

09:00 AM until 07:00 PM

--- ---

OWASP Application security event in Ain Shams University [Event Postponed]


 Registration Details: Will be opened soon, It is free and we don't have limitation for the number of attendees

Location: Ain Shams University Khalifa El-Maamon St، Cairo,‬ 11566, EGYPT

Date: Saturday, April 9th, 2016 10:00 AM until 02:00 PM

Event Agenda:  1- Introduction to application security and OWASP academic program (30 min) 2- OWASP top 10 in details (45 min) 3- OWASP AppSec Projects, how could students contributes and how to get support from Egyptian OWASP members (45 min) 4- Open Discussion panel

Detailed agenda will be updated soon

--- ---

OWASP Cairo Chapter in Bluekaizen CSCamp 20 Sep. 2015


 Registration Details: The Attendance will be free of charge without need for conference ticket,

These sessions are served in the way of First Come First Served. The room has a limitation of 50 persons only. If you are interested to attend please try to be there before the session start by a good amount of time.

Location: Intercontinental City Stars, Al saraya Hall, Nasr City, Cairo, EGYPT

Date: Saturday, September 20th, 2015 02:00 AM until 05:00 PM

Event Agenda:  Software Security Assurance (By: Nadim Barsoum)

Implementing a software security assurance program can be a daunting task that can leave program managers and consultants equally overwhelmed. In this talk we discuss the main building blocks of a software security assurance program and suggest light-weight methods for jump-starting your program with a focus on assurance activities and their relating governance aspects.

Mobile Application Security (By: Hassan Elhadary)

Nowadays web applications are being transformed into mobile applications allowing users to perform security critical functions such as money transfers and bill payments from their mobile devices. Newly added features on mobile applications expose new attack surface for hackers and thus increase the challenges for developers to defend their mobile applications. This talk will focus on latest techniques utilized by attackers to conduct security attacks on mobile applications. It will include real life stories and demos inspired from professional experience and research in bug bounty programs. Finally, recommendations will be outlined to help developers mitigate most common attacks affecting mobile applications.

Application Threat Modeling (By: Mohamed Alfateh)

According to the US Computer Emergency Readiness Team (US-CERT), most successful cyber-attacks result from targeting and exploiting software vulnerabilities. Threat Modeling is a critical activity for identifying such vulnerabilities early in the development stages. In this talk, we will discuss application threat modeling process, how to perform threat modeling in systematic way and how to integrate threat modeling in your software development life-cycle.

--- ---

OWASP Cairo Chapter Event (May 2015)
Registration Portal: Click Here

Meeting Agenda:

10:00 – 10:30 Registration 10:30 – 11:30 Standards of Information Security, Privacy and Governance in Enterprise Application Security (By: Adel Abdel Moneim) 11:30 – 12:30 ZAP Project, New Release, New Features (By: Mohamed Alfateh) 12:30 – 01:00 Break 01:00 – 02:00 HTML5 security (By: Hassan Mohammed) 02:00 – 03:00 WAF Evasion Techniques and Thoughts of Secure Coding (By: Ahmed Alaa)

Location: Nile University Juhayna Square - Sheikh Zayed, Giza,

Date: Saturday, May 9, 2015 10:00 AM until 3:30 PM

Chapter Facebook Page: https://www.facebook.com/OWASPCairo

--- ---

OWASP Cairo Chapter in Bluekaizen CSCamp 2014


 Registration Details: The Attendance will be free of charge without need for conference ticket,

These sessions are served in the way of First Come First Served. The room has a limitation of 50 persons only. If you are interested to attend please try to be there before the session start by a good amount of time.

Location: Nile University, New Campus, Sheikh Zayed District, 6th of October, Giza, EGYPT

Date: Saturday, November 29th, 2014 02:30 AM until 05:30 PM

Event Agenda:  Advanced XSS Filter Evasion and Post Exploitation (By: Ahmed Saafan) Hands-on Reverse Engineering Android Malware (By: Anwar Mohamed) Introduction to web crawling (build a smart web crawler) (By: Ayman Mohamed)

--- ---

Chapter Meeting (14 June 2014)


Registration Portal: Click Here

Meeting Agenda:

10:00 – 10:30 Registration 10:30 – 11:15 US AppSec Conference 2013 – Brief about some Interesting Topics (By: Mostafa Siraj) 11:15 – 12:00 Sleeping your way out of the sandbox (By: Hassan Mourad) 12:00 – 12:30 Pwning the skiddies using the anonymity weapon (By: Ahmed Sultan) 12:30 – 01:15 HTML5 security (By: Hassan Mohammed) 01:15 – 02:00 Break 02:00 – 02:45 Anti "Anti-Crawling" Techniques (By: Ayman Mohammed) 02:45 – 03:30 Cloud Security Risks - Pain & Relief (By: Moataz Abd El Khalek) 03:30 – 04:15 Mobile Application hacking and forensics (By: Adel Abdel Moneim)

Location: 56 Gamaet El Dewal El Arabeya St - Al-Mohandiseen Building - In front of Moustafa mahmoud's mosque

Date: Saturday, June 14th, 2014 10:00 AM until 4:00 PM

Chapter Facebook Page: https://www.facebook.com/OWASPCairo

--- Sessions Description ---

Pwning the skiddies using the anonymity weapon Proxy services and vpn servers are used widely all over the world But, can you really depend on them as secure way to surf the WWW? We gonna demonstrate how the such services are invisibly used to take over thousands of PCs every single hour.

Sleeping your way out of the sandbox Recently, a new breed of security solutions appeared in the market, Sandbox based Antimalware solutions, promising to be the answer to advanced malware and APTs.

Yet, as always, there are ways to circumvent any control. In this presentation we will examine a new technique to bypass sandbox based solutions, allowing malware to avoid detection and giving it a free pass to your network.

HTML5 security HTML5 was specially designed to deliver rich content without the need for additional plugins. The current version delivers everything from animation to graphics, music to movies, and can also be used to build complicated web applications. Through introducing these new features new vulnerabilities are introduced as well.

This talk will give an introduction about HTML5 and its new features. Then will select a number of examples to demonstrate the positive, and negative impact of these features for web application security. Event gifts sponsored by SecurityMeter and ZINAD

--- ---

Chapter Strategic Meeting (6 May 2014)
This meeting will focus on preparing the chapter activities plan. (2 hours meeting with no educational sessions) The meeting will be limited for Egyptian AppSec experts only During this meeting, we will discus (in details) the chapter participation in the application security awareness program (determine the joined resources, selecting workshops materials ..... ) If anyone is interested, please contact the chapter leader [mailto:mohamed.alfateh@owasp.org Mohamed Alfateh]

--- ---

Event Presentations
Eg-CERT Cyber security Awareness Team [Ahmed Mashaly] Living at 21 programmers’ st. Pitfalls in code review [Fady Othman] OWASP SRDF Project [Anwar Mohamed] Yahoo Zero Day Vulnerability - Code Point of View [Ebrahim Hegazy] OWASP Lab Projects Overview [Ahmed Saafan] OWASP Flagship Projects Overview [Hassan Elhadary] OWASP Egypt Chapter - Introduction [Mohamed Alfateh]

This event will focus on introducing OWASP to our local community, organizing the chapter contribution and planning the 2014 chapter activities. The event will be hold on the second Saturday of April (12/4/2014) at EBI (Egyptian Banking Institute) Meeting Agenda

10:00 – 10: 30 OWASP Egypt Chapter - Introduction (By: Mohamed Alfateh) 10:30 – 11:00 Egypt Cert Application Security Awareness Program (By: Ahmed Mashaly) 11:00 – 11:30 US AppSec Conference 2013 – Brief about some Interesting Topics(By: Mostafa Siraj) 11:30 – 12:00 OWASP Security Research and Development Framework(By: Anwar Mohamed) 12:00 – 12:30 Break 12:30 – 01:00 Effective Bug Hunting for Open Source Applications (By: Fady Othman) 01:00 – 01:30 Yahoo Zero-Day Vulnerability - Code Point of View(By: Ibrahim Hegazy) 01:30 – 02:45 OWASP Projects - Overview(By: Ahmed Saafan, Hassan Alhadary and Mohamed Alfateh) 02:45 – 04:00 Panel Discussion: Information Security Challenges, from Individual Privacy to National Security. (Session moderator: Adel Abdel Moneim)

--- ---

WELCOME MANSOURA! As of 11 September 2011, there is now a new OWASP Chapter in Mansoura, Egypt. The chapter leader is [mailto:ahmed.neil@owasp.org Ahmed Neil]. Click here to learn more about what is going on in Mansoura! OR Click here to view or subscribe to the Mansoura mailing list.

You can Download the OWASP LiveCD presentation HERE ( Presented @ OWASP - Alexandria Meeting and QCERT Event ) January 2009

Chapter Meetings
OWASP-Egypt Presents on the OWASP Live CD

Qatar,January 27th, OWASP Egypt Presented a live DEMO of the OWASP Live CD During the Qatar Chapter Meetings, More than 60 Copies of the Live CD were distributed to the delegates of Carnegie Mellon Qatar and Qatar University Press Release , A copy of the Presentation Can be Found HERE.

OWASP-Egypt Presents on the OWASP Initiatives

Alexandria,Egypt 12th of February 2009, OWASP Egypt presented (Introduction to OWASP Initiatives ) to the IT staff of 2 prominent Oil&Gas Companies

OWASP-Egypt Holds a Presentation in Qatar

Doha,Qatar 24th of February 2008, OWASP-Egypt participated in a web security awareness session held in Qatar Sponsored by the country's national CERT team.

the delegates were briefed on OWASP and its objectives, the role OWASP-Egypt chapter is playing in promoting web security best practices in the local IT community and our personal experience on how Qatar can start its very own OWASP chapter.

With the amount of enthusiasm we felt we are expecting a new chapter in the region very soon !

Egypt OWASP Chapter Leaders
The Alexandria Chapter Leader is [mailto:hamed.farid@owasp.org Hamed Farid].

The Cairo chapter leader is [mailto:Mohamed.Alfateh@owasp.org Mohamed Alfateh].

The Mansoura chapter leader is [mailto:ahmed.neil@owasp.org Ahmed Neil].

The Sohag chapter leader position is open. Please visit the Volunteer Page to request a chapter restart.