Netherlands

Call for Speakers
We are continuously looking for speakers and presentations make the chapter meetings as interesting as possible. Therefore we are looking inside and outside OWASP for known international specialists. But we know, there is a lot interesting stuf happening inside the Netherlands, too! Presentations: Are you working on interesting subject, you would like to share your experiences with the OWASP community. Any topic related to application security will be appreciated! VAC, Vulnerability, Attack, Countermeasure: The goal is an half hour in-depth technical presentation about a vulnerability, how it can be exploited and how to prevent it!

Sponsorship of a local chapter meeting
We are continuously looking for locations to hold local chapter meetings. Therefore, we need companies willing to sponsor of host events. Hosting a local chapter meeting: To host a local chapter meeting, you facilitate the meeting location and beverage for the attendees Sponsorship of a local chapter meeting: You cover the cost of renting the location for the meeting and the payment of the beverages for the attendees Please let us know via the OWASP chapter meeting questionnaire of via email to martin.knobloch@owasp.org 

OWASP NL Cafe
NEW: Monthly informal platform to speak about (Web) application security matters! No registration required, just drop by!
 * no programm
 * no agenda
 * whatever comes up!

Next OWASP Cafe:
Tuesday August 6th, from 7 pm, drop in whenever you can!

As it's summertime and perfect weather, another time at my place!

Where: Prof. Dr. Ornsteinlaan 14 3431 EP Nieuwegein

OWASP NL Chapter Meetings Schedule 2009
This is an overview of the 2009 local chapter meeting schedule. Details of the meetings can be found in the announcements that will be posted below this schedule. April 9th -- Time        : 18.00 - 21.30 Main Topic  : Knowing Your Enemy Presentations: Modern information gathering; how to abuse search engines        Dave van Stein VAC Cross-site scripting                                         Martin Visser Beveiligingsaspecten van webapplicatie-ontwikkeling              Wouter van Kuipers Location    : Lange Dreef 17 4131 NJ Vianen Sponsor     : Sogeti Nederland B.V.

May 28th -- Time        : 18.00 - 21.30 Main Topic  : AppSec Europe 2009 Presentations: AppSec-EU 2009                                                   Sebastien Deleersnyder, Telindus VAC Cross-Site Request Forgery                                   Niels Teusink Open session / discussion about subjects brought forward by               the attendees                                                     Martin Knobloch/Ferdinand Vroom/Peter Gouwentak Location    : ASR Nederland MD0.60 - Auditorium Smallepad 30 3811MG Amersfoort Sponsor     : ASR Nederland

September 24th -- Time        : 17.30 - 21.30 Main Topic  : Presentations: Location    : Sponsor     :

December 10th -- Time        : 17.30 - 21.30 Main Topic  : Presentations: Location    : Sponsor     :

Registration If you want to attend, please send an email to: netherlands-board@lists.owasp.org All OWASP chapter meetings are free of charge and you don't have to be an OWASP member to attend. There are never any vendor pitches or sales presentations at OWASP meetings. NOTE TO CISSP's: OWASP Meetings count towards CPE Credits.

OWASP NL Mini-Meetings
NEW: Platform to discus on specific issues related to (Web) Application Security. The topic's are brought in by the OWASP NL community! Something on your mind to discus, put your idea online at: Mini Meetings Netherlands_Mini_Meeting_2009 To attend the meeting, send an email to the contact's email address!

Next Mini-Meeting: CANCELLED !!!
Topic       : Tools of the trade; exchange real-life experiences Contact     : Dave van Stein, dvstein+owasp [-at-] gmail [-dot-] com -- Date        : cancelled Time        : Location    : Details     : Exchange real-world experience about web testing tools. What is really useable and what is not. Attendees   : Min 6, max 8, currently 3 attendees

Meeting minutes May 28th 2009
At May 28th, the Dutch OWASP chapter came together at the ASR building in Amersfoort. The main topic of the evening was AppSec 2009. There were 2 speakers and approximately 20 attendees. There was no sponsor talk or general announcement so after a very short welcome talk by Bert the evening started. First presentation: AppSec 2009 by Sebastien Deleersnyder. The first presentation of the evening was a recap of AppSec 2009 in Poland. The conference was a big success with around 170 attendees. The meeting preceded the 2009 edition of Confidence resulting in a week of security presentations and workshops. All AppSec presentations and many movies, pictures, and other material can be found on the AppSec wiki but a few items are worth mentioning in specific. First of all OWASP is growing and changing. These changes include a simplification of the membership fees, the introduction of a 'code of ethics', and a general review of all 120 projects. Other highlights are the project ASVS, which has reached an international standard status and updated versions of WebGoat and LabRat. Lastly besides a Wiki and a LinkedIn group, OWASP is now also active on Twitter &  and has two overview pages with all video  and audio materials. Feel free to use all the materials (as long as you abide by the new code of ethics off course) and visit the OWASP websites frequently for updates ! Second presentation: VAC Cross-Site Request Forgery by Niels Teusink. After succesfull VAC's about SQL injection and Cross-site scripting, the topic of this evening's VAC was Cross-site Request Forgery, also known as CSRF. CSRF is probably one of the least understood vulnerabilities, but can have tremendous consequences when succesfully exploited. In essence it is an attack that misuses the victim's autorisations with malicious scripts. CSRF attacks can also be easily combined with other attack, like e.g. XSS, making them even more dangerous. Despite the name suggests, these attacks do not have to be on different websites (domains). With the continuing trend to combine multiple functionalities in a single application, so-called onsite request forgeries are becoming more and more frequent. Contrary to XSS and SQL injection, CSRF can not be blocked by input validation. In order to prevent these kind of attacks, an application has to able to verify the authenticity of a request. This can be achieved by several methods like using a unique identifier for a session or each request or requiring additional user input like a CAPTCHA or a one-time token. Open Discussion The evening was closed with an open discussion about how to improve knowledge sharing among the OWASP members. Many interesting discussions start during the drinks after the presentations on the OWASP evenings, discussions that sadly often are stopped prematurly due to time restraints. As an addition on the quarterly presentation evenings, the Dutch chapter decided to also start mini-meetings and the OWASP cafe. Mini-meetings will not be planned on beforehand, but instead will be planned when a topic is proposed and enough attendees have stated an interest in the topic. The attendees will have to select a location themselves but can request a donation from the OWASP for drinks and snacks. Topics discussed at the mini-meeting will have to be listed in minutes so other members can also profit from this knowledge exchange. The OWASP cafe will be planned each first thursday of the month on a location that will be listed on the OWASP Dutch chapter site. The rules are simple: the evening starts at a certain time, ends at a certain time and will be filled with drinks, snacks, and nerd/hacker/geek humor and discussions in between. Check the website frequently for the location of the next mini-meeting and OWASP cafe !

Meeting minutes April 9th 2009
At April 9th, the Dutch OWASP chapter came together at the office of Sogeti in Vianen. The main topic of the evening was "knowing your enemy". There were 3 speakers and approximately 50 attendees. The sponsor of the evening started with a small welcome and an overview of their internal security program named PASS. After some small announcements from the OWASP the evening started. First presentation: Modern information gathering; how to abuse search engines by Dave van Stein. The first presentation of the evening was about using search engines and crawlers to gain detailed information about webservers and websites. Ill configured webservers allow search engine crawlers to collect much information about a system, information that is stored and can be retrieved with search engines. Many websites and tools make use of this mechanism and, combined with DNS and WHOIS information, are able to provide detailed or sensitive information like usernames, vulnerabilities, present files or network topology about a system without targeting it directly. Restricting crawlers to access a system can act as a first line of defence and reduce exposure and risks. Second presentation: VAC Cross-site scripting by Martin Visser. The second VAC on an OWASP meeting was about Cross-site scripting also known as XSS. XSS vulnerabilities are often misunderstood and underestimated but facts show that XSS vulnerability abusing attacks are nowadys the fastest growing and most widespread type of exploit. In short XSS vulnerabilities allow for user input to be executed when containing javascript or HTML code. When combined with other vulnerabilities the possibilities of these attacks are vitually limitless. The only way to prevent these attacks is to sanitize all input and output fields, but this can be more difficult than it appears to be. Simply blacklisting fragments like is not sufficient due to the possibility of recursivity (e.g. ) and encoding (e.g. URL encoding: %3C%73%63%72%69%70%74%3E). Using multiple layers of filters on various places is the only way to assure enough protection against these types of attacks. Third presentation: Beveiligingsaspecten van webapplicatie-ontwikkeling by Wouter van Kuipers. The third presentation of the evening was about the efficiency of a source code analyer for php based websites. Approximately 33% of all websites use php and this can be explained by the low learning curve and ease of use of the language. Due to the low learning curve many php developers have little experience with programming and almost no awareness regading security resulting in many unsecure websites. Source code analysis can help preventing many security issues, but their usage does have some limitations. Firstly the scan on itself takes only a few minutes, but analysing the results requires much longer and depends greatly on how familiar the analyser is with the scanned source code. Second these analysers produce many flase positives, making analysis even more time consuming. Lastly not all vulnerabilities are detected with the same efficiency. Especially vulnerabilities that are dependent on the application logic like injection or XSS are not always efficiently detected. Concluding, like all tools, a source code analyser can be a powerful tool, but one has to be aware of its limitations. These tools can provide results very fast, but when used on unfamiliar code the analysis can be very time consuming.

Meeting Schedule May 28th 2009: AppSec Europe 2009
Summary The main goal of the upcoming OWASP-NL meeting is to provide an abstract of the recently held AppSec Europe 2009, a VAC about CSRF and, new, an open discussion on application security subjects brought forward by the attendees.

18.30 - 18.45 Introduction (OWASP organization, projects, sponsor) 

18.45 - 19.45 AppSec-EU 2009 (Sebastien Deleersnyder, Telindus)  Update on the AppSec-EU 2009: OWASP State of the union, an update on OWASP and OWASP projects and of course the highlights of the AppSec-EU 2009 presentations.

19.45 - 20.00 Break 

20.00 - 20.30 VAC Cross-Site Request Forgery (Niels Teusink, Fox-IT)  ([[Media:20090409_VAC-CSRF-Niels_Teusink.pdf]]) CSRF is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated. With a little help of social engineering (like sending a link via email/chat), an attacker may force the users of a web application to execute actions of the attacker's choosing. A successful CSRF exploit can compromise end user data and operation in case of normal user. If the targeted end user is the administrator account, this can compromise the entire web application.

Niels Teusink holds a bachelor degree in Computer Science and has been experimenting with IT security for over a decade. He has worked for Fox-IT since 2005; first as a software engineer and since 2007 as a penetration tester. He has since performed dozens of penetration tests for all sorts of companies, including governments, banks and nuclear installations.

20.30 - 21.15 Open session / discussion (Martin Knobloch/Ferdinand Vroom/Peter Gouwentak)  Open session / discussion about subjects brought forward by the attendees.

The Announcement of this meeting: [[Media:Announcement OWASP-NL May 28th 2009.pdf]] The flyer of this meeting: [[Media:owasp_NL_may2009.pdf]]

Meeting Schedule 9th April Knowing Your Enemy
Summary The main goal of the upcoming OWASP-NL meeting is to provide information to managers, architects, designers, developers and security and risk professionals. The speakers will give specific examples and there will be time to ask questions.

18.30 - 18.45 Introduction (OWASP organization, projects, sponsor)  18.45 - 19.30 Modern information gathering; how to abuse search engines            Dave van Stein ([[Media:20090409_passsive_reconnaissance-Dave_van_Stein.pdf]]) Great generals already know the key to success is "knowing your enemy". In hacking terms this is called information gathering, fingerprinting or reconnaissance. Traditionally this phase consisted of using public records like WHOIS and DNS combined with active scans on servers. With the rise of advanced search engines like Yahoo, Live Search and Google a whole new type of reconnaissance has come to life; passive reconnaissance. Often servers are not properly configured which causes lots of valuable information to become available without accessing the server at all. Recently several hacker-tools appeared which use the full capabilities of these search engines giving hackers a head-start at mapping the network they plan to attack. The goal of this session is to give insight in the methods and tools hackers have at their disposal to gather information about systems they plan to attack without accessing the system itself. Dave van Stein has close to 8 years of experience in software testing. Since the beginning of 2008 he's working for ps_testware as a web application security testing specialist.

19.30 - 20.00 VAC Cross-site scripting     Martin Visser ([[Media:20090409_VAC_Cross-site-scripting_Martin_Visser.pdf]]) Martin Visser is a software designer with Sogeti Nederland B.V. specialized in secure application development with Microsoft technologies. He has experience with Microsoft server technologies like ASP.NET, SharePoint and Biztalk. Martin also developed and teaches a 2-day "Application Security - Microsoft development" course both within and outside Sogeti.

20.00 - 20.15 Break  20.15 - 21.00 Beveiligingsaspecten van webapplicatie-ontwikkeling Wouter van Kuipers  ([[Media:20090409_presentatie_Wouter_van_Kuipers.pdf]]) Het ontwikkelen van webapplicaties verschilt op verschillende aspecten met het ontwikkelen van desktop applicaties, met name op het gebied van security. Voor grote bedrijven zijn er oplossingen beschikbaar als bijvoorbeeld SDL, maar voor het midden- en kleinbedrijf zijn dit soort oplossingen beperkt, omdat zij vaak niet de middelen hebben om dergelijke strategieën uit te kunnen voeren. Voor zijn scriptie heeft Wouter van Kuipers middels een literatuuronderzoek, interviews met ontwikkelaars en een onderzoek naar Fortify 360 gekeken hoe het midden- en kleinbedrijf omgaat met deze verschillen en hoe zij het ontwikkelproces kunnen optimaliseren op het gebied van security.

Na een MBO opleiding in de IT is Wouter van Kuipers via de HBO opleiding 'Communicatie Systemen' begin 2007 begonnen met een master Informatiekunde aan de Radboud Universiteit Nijmegen, welke hij in maart dit jaar hoopt af te ronden. Tijdens zijn MBO studie is zijn interesse in het ontwikkelen van webapplicaties gewekt, wat in 2003 resulteerde in het opzetten van een eigen web-development bedrijf. Dit bedrijf is met name gespecialiseerd in het ontwikkelen van webapplicaties op maat, en het ondersteunen van bedrijven op het gebied van web-developement op freelance basis.

The flyer of this meeting: [[Media:owasp_NL_april2009.pdf]]

Past Events

 * Events held in 2008
 * Events held in 2007
 * Events held in 2006
 * Events held in 2005