Netherlands

Local News
Please block your agendas on Thursday, March 11th, 18h-21:30h for the next Netherlands chapter meeting. Subject will be: Database Security!

2010 Schedule

 * March 11th, 18.00 - 21.30 Topic: Database Security
 * May 20th, 18.00 - 21.30 Topic: Web Application Firewalls
 * September 23rd, 18.00 - 21.30 Topic: Security in Content Management Systems
 * November 18th, 18.00 - 21.30 Topic : TBD

REGISTRATION
To register for a chapter meeting (first register, first serve)! Please send an email to: [mailto:netherlands@owasp.org netherlands 'at' owasp.org].

WHEN
May 2010 (18h00pm-21h30pm).

PROGRAM
18:00 - 18:30 Check-In (catering included) 18:30 - 18:45 Introduction (OWASP organization, projects, sponsor) 18.45 - 19.45 Web Application Firewalls in dynamic environments(by Alexander Meisel) Alexander Meisel is the CTO of 'art of defence' (AOD), a German based software vendor. The company specializes in high performance deployments of Web Application Firewalls in very dynamic environments all over the world.

Abstract: The current trend towards cloud computing forces everybody to deploy services in a virtual environment. In current dedicated environments WAFs or Web Application Firewalls are mostly deployed as a hardware (black) box which is easy at first but limits them to only low performance web cluster architectures. Moving those systems virtualized into a cloud environment makes almost no sense because of the resource limitations. The is solution is a redesign which enables WAFs to be part of a true message based cloud system. This talk explains how truly virtualized and distributed web applications are architected, work and scale in high performance environments. 19.45 – 20.00 Break 20.00 - 21:00 Bypassing Web Application Firewalls (by Sandro Gauci) Sandro Gauci is the owner and Founder of EnableSecurity (www.enablesecurity.com) where he performs R&D and securityconsultancy for mid-sized companies. Sandro has over 9 years experience in the security industry and is focused on analysis of security challenges and providing solutions to such threats. Hispassion is vulnerability research and has previously worked together with various endors such as Microsoft and Sun to fix security holes. Sandro is the author of the free VoIP security scanning suite SIPVicious (sipvicious.org) and VOIPPACK for CANVAS.

Abstract: WAFs or Web Application Firewalls are being deployed to fix security issues in your web applications. The question is, are they? In this presentation we take a look at some of the issues related to making use of this solution and how it may affect the overall security posture of your web application. Finally we will describe tools to automate detection of WAFs, and also tools to help identify ways to bypass WAFs. This presentation will include updates to the open source WAF security testing tools - WAFFIT. 21.00 – 21:30 Discussion, questions and social networking

The Announcement of this meeting: [[Media:Announcement_OWASP-NL_May_20th_2010.pdf]]

WHEN
Thurday, March 11th, 2010 (18h00pm-21h30pm).

PROGRAM
18:00 - 18:30 Check-In (catering included) 18:30 - 18:45 Introduction (OWASP organization, projects, sponsor) 18.45 - 19.45 SQL Injection - How far does the rabbit hole go? (By Justin Clarke) Justin Clarke is a co-founder and Director at Gotham Digital Science, based in the United Kingdom. He has over twelve years of experience in assessing the security of networks, web applications, and wireless networks for large financial, retail, technology and government clients in the United States, the United Kingdom and New Zealand. Justin is the the technical editor and lead author of “SQL Injection Attacks and Defense” (Syngress 2009), co-author of "Network Security Tools: Writing, Hacking, and Modifying Security Tools" (O’Reilly 2005), a contributing author to "Network Security Assessment: Know Your Network, 2nd Edition" (O’Reilly 2007), as well as a speaker at a number of conferences and events on security topics, including Black Hat USA, EuSecWest, OSCON, ISACA, RSA, SANS, OWASP, and the British Computer Society. He is the author of the open source SQLBrute blind SQL injection testing tool, and is the Chapter Leader for the London chapter of OWASP. SQl Injection - How far does the rabbit hole go? SQL Injection has been around for over 10 years, and yet it is still to this day not truly understood by many security professionals and developers. With the recent mass attacks against sites across the world it has again come to the fore of vulnerabilities under the spotlight, however many consider it to only be a data access issue, or parameterized queries to be a panacea. This talk starts from what was demonstrated last year at Black Hat in Las Vegas, where a self propagating SQL Injection worm was demonstrated live on stage. Explore some of the deeper, darker areas of SQL Injection, hybrid attacks, and exploiting obscure database functionality ([[Media:OWASP-SQLInjection5nov09.pdf|the slides in pdf format]]) 19.45 – 20.00 Break 20. 00 – 20.30 VAC Insecure Direct Object Reference (By Marinus Kuivenhoven) Marinus Kuivenhoven is a Senior Technology Specialist with Sogeti Nederland B.V. specializing in service oriented architectures and secure application development. His experience include developing and administrating Oracle-based systems. At Sogeti Nederland B.V. he is also an active member of the PaSS -Software(Proactive Security Strategy) taskforce focusing on secure application development. Marinus also developed and teaches several application security courses both within and outside Sogeti. In the past years he has written for magazine such as Computable and We Love IT. And he has spoken on a number of conferences and events like OWASP, Recent OO Trends, Open Source Developer Conference and Engineering World. Vulnerability: Insecure Direct Object Reference is when a web application exposes an internal implementation object to the user. Some examples of internal implementation objects are database records, URLs, or files. Attack: An attacker can modify the internal implementation object in an attempt to abuse the access controls on this object. When the attacker does this they may have the ability to access functionality that the developer didn’t intend to expose access to. Countermeasure: Reference should be validated for authorization and accessed through reference maps. How this should be done will be shown. ([[Media:20100311_VAC-IDOR_Marinus Kuivenhoven.pdf|the slides in pdf format]]) 20.30 – 21.15 Overlooked Resources and Practices (By Justin Clarke) In his second presentation, Justin Clarke discussed OWASP resources and best practices by highlighting some OWASP projects and underused security practices. He shared his experiences in his daily work as well as the known pitfalls. ([[Media:20100311_Overlooked_Resources_and _Practices-Justin_Clarke.pdf|the slides in pdf format]]) 21.15 – 21:30 Discussion, questions and social networking

The Announcement of this meeting: [[Media:Announcement_OWASP-NL_March_11th_2010.pdf]] The flyer of this meeting: [[Media:Owasp_NL_march2010.pdf]]

Past Events

 * Events held in 2009
 * Events held in 2008
 * Events held in 2007
 * Events held in 2006
 * Events held in 2005

Call for Speakers
We are continuously looking for speakers. Presentations: Are you working on an interesting subject, would you like to share your experience with the OWASP community and do you have presentation skills. Please let us know! Any topic related to web application security will be appreciated! VAC, Vulnerability, Attack, Countermeasure: The VAC is a re occuring part of the chapter meetings. The VAC is a half hour in-depth technical presentation about a vulnerability, how it can be exploited and how to prevent it!

Links:

Speaker Agreement

Template

Chapter Leaders
The Netherlands Chapter is supported by the following board:


 * [mailto:bert.koelewijn@owasp.org Bert Koelewijn], ASR
 * [mailto:peter.gouwentak@owasp.org Peter Gouwentak], ING
 * [mailto:martin.knobloch@owasp.org Martin Knobloch], Sogeti
 * [mailto:ferdinand.vroom@owasp.org Ferdinand Vroom], Nationale Nederlanden

Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects.

Chapter Sponsoring
OWASP Netherlands is looking for organizations to sponsor our chapter. If you are interested in sponsoring the Netherlands chapter please contact via email: [mailto:netherlands@owasp.org netherlands 'at' owasp.org].

If you would like to donate to our chapter, please use the PayPal link below. Thank you!

Netherlands