Cork

From OWASP
Jump to: navigation, search

OWASP Cork

Welcome to the Cork chapter homepage. Owasp logo ireland small.jpg
Click here to join the local chapter mailing list.

Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter.

Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG

Becoming a chapter sponsor means that you get your organisation mentioned in meeting promotion (including on this page if desired), recognition at the beginning of the meeting and promotional material at the meeting.
We currently have the following sponsorship options available:
€250 for an individual meeting sponsorship
€1500 for annual chapter sponsorship
Contact any of the board members below for more information.

OWASP Cork Board

Should you have a question about the local chapter, would like to get more involved contact any of the following people below

Chapter Leads:

Details and registration for all chapter meetings are available on our Meet-Up page: http://www.meetup.com/OWASP-Cork/

Chapter Meetings - 2015

TBD - SNEAK PREVIEW ONLY - Feb 2016 Chapter Meeting - Docker Security and SSL/TLS Recent Issues

TBD - SNEAK PREVIEW ONLY - December Chapter Meeting - Docker Security and SSL/TLS Recent Issues
When Where
TBC

Doors: 19:00
Talks start: 19:10
Venue Location: TBC

To Find Us: click here
To Register: click here

SLIDES FOR THIS MONTH

TBD - After event

DESCRIPTION

TBD - THIS IS JUST A SNEAK PREVIEW


Talk #1 - SSL/TLS Recent Security Issues

Speaker Bio: Juan Galiana

Juan Galiana works as the EMEA Security Technical Lead for IBM Cloud Services, in this role he is responsible for securing infrastructure, platform and applications hosted by IBM and delivered as a service to hundreds of thousands of customers across the globe. Apart from his work at IBM, he contributes to open source projects like the Browser Exploitation Framework (BeEF), he is co-author of the OWASP Testing Guide 4.0 and the HTML5 Security Cheat Sheet project lead. He is a regular speaker in Security Conferences, among others he presented at OWASP Europe and AppSec USA.

Talk #2 - About Docker

Speaker Bio: Tom Barlow

Software Engineer, Docker, Inc. Tom Barlow (@tomwbarlow) is helping to build enterprise products and solutions at Docker, Inc. He became interested in container technologies whilst working at HP and found that Docker's solid product made packaging up an application for deployment easy. He's currently involved in coming up with solutions to some of the challenges around orchestration, discoverability, monitoring, log management and support of Docker infrastructure.

Talk #3 - Docker Security

Speaker Bio: Juan Galiana

^ See Info Above ^

Speaker Bio: David Lynch

David Lynch is a Security Specialist with IBM Cloud Services. His areas of expertise are Threat Intelligence, SIEM, Patch Management and Encryption. David started as a security engineer for IBM SaaS, he then progressed to security compliance and SME and is currently transitioning to Ethical Hacking with IBM Cloud. Externally David is currently finalising his Masters in Forensics and Cyber Security.

Afterwards ...

Some sort of Christmas get-together. Not decided yet, but watch this space!!

November Chapter Meeting - PCI DSS Pen Testing / IAM (Identity & Access Mgmt)

November Chapter Meeting - PCI DSS Pen Testing / IAM (Identity & Access Mgmt)
When Where
Thursday 12th Nov 2015

Doors: 19:00
Talks start: 19:10
Venue Location: Cashmans (upstairs), 26 Academy Street, Cork

To Find Us: click here
To Register: click here

SLIDES FOR THIS MONTH

TBD - After event

DESCRIPTION

On Thursday November 12th we have two great speakers lined up for our next chapter meeting. Both posses great experience in their respective areas, so can get across the information and answer your questions that might not be so easy to find in the books. Stephen O'Boyle will talk about PCI DSS (Payment Card Industry - Data Security Standard), the set of compliance guidelines that you must adhere to if you store, transmit or process credit card information. This will be followed up with Barry Mulcahy's valuable information on management of identity and access to data across systems.

Also, thanks to the kind sponsorship from Espion on the night there will be some food and drinks provided too. No doubt, this should be a great night :)

Talk #1 - PCI DSS v3.1 Scanning and Penetration Testing

Stephen will discuss the key changes in PCI DSS Version 3.1, examine penetration testing methodology from the auditor’s point of view, and how you can maintain compliance.

Key Takeaways will include

∙ PCI DSS Pentest / Scanning overview

∙ Migrating from V2 to V3.1

∙ Changes to penetration testing requirement 11.3

∙ Scanning vs pen testing

∙ What the auditor expects from pen testing

∙ Example methodology

Speaker Bio: Stephen O'Boyle

Stephen heads up Espion’s Professional Services team and has been a PCI Qualified Security Assessor since 2008. He is an experienced information security, risk and compliance consultant with has over ten years’ experience in information security in both domestic and international markets. Stephen has extensive experience in performing PCI audits / consultancy, information security & risk management assessments, network / architecture security reviews, application security reviews, penetration testing and assisting organisations in aligning their information security posture to their business objectives. Stephen has worked across a wide range of industry verticals, including government, financial, education and technology.

Talk #2 - Identity and Access Management (IAM)

This talk will focus on Identity and Access Management (IAM), what it is and how it fits into the security landscape. It will outline the lifecycle of an identity (Hello new hire Alice!). How we move from having an identity to having access. Some of the common pitfalls encountered during IAM integration projects. Analytics techniques for IAM that smooth the integration path, validate controls and provide valuable Business Intelligence (BI) that are useful for process improvement and security auditing. The talk will conclude by looking at some of the recent trends in IAM and some pointers for the future.

Speaker Bio: Barry P. Mulcahy

Barry received a B.Sc. in computer science from UCC in 2001 and a Ph.D. in distributed security systems from UCC in 2008. His academic experience involves R&D in distributed security systems with an emphasis on data aggregation, analytics and workflows. While working in Waterford IT as a security researcher he was involved in several large European FP7 projects including CoMiFin, EternalS and Aniketos. His commercial roles include Identity and Access Management (IAM) Project Manager at Onaware-Mycroft. This boutique IAM integration house catered primarily for financial institutions. Barry is currently part of the Qualcomm Web Authentication team, helping design and implement security controls for authentication and authorization in Qualcomm’s global IT infrastructure.

https://ie.linkedin.com/in/barrymulcahy

Afterwards ...

We might have a few sneaky pints afterwards, and you are all welcome to join us.

We are having the talks in Cashman's Bar on Academy Street so we will stay on there.

Top 10 Workshop #5 (Broken Auth & Session Mgmt, Security Misconfiguration and Sensitive Data Exposure) - 15 Oct 2015

OWASP Top 10 Workshop #5 (Broken Auth & Session Mgmt, Security Misconfiguration and Sensitive Data Exposure)
When Where
THursday 15th Oct 2015

Doors: 19:00
Talks start: 19:10
Venue Location: UCC, Western Gateway Building, Room G08

Venue Address: Western Road, Cork
Venue Map: Google Maps
(Registration. Register here)

SLIDES FOR THIS MONTH

Slides - A2, A5 and A6

DESCRIPTION

Topics:

- A5 Security Misconfiguration

- A2 Broken Authentication and Session Management

- A6 Sensitive Data Exposure

Hi all,

On Thursday, October 15th, we are holding the last of our free series of workshops based on OWASP's most well known flagship project, the OWASP Top 10 (2013) https://www.owasp.org/index.php/Top10. The goal of these workshops is to learn by doing, which is usually the best approach to learning anything. In that light, we will speak a little about each of the areas from the Top 10, then take that learning to the next level by attacking vulnerable sites and investigating vulnerable code and configurations.

Note: During the previous workshops we set up our machines to be ready for web penetration testing. Anyone who has done this can continue as such, but if you have not, no problem, we can help you set up the one or two main tools that we will need for that night. That should only take a couple of minutes. If you would like some assistance in getting set-up then we will be there from 18:45 to help. Alternatively, you can contact one of the organisers (Fiona or Darren) in advance and we will let you know what you need.

If you would like to have ZAP installed on your machine you can get it here: ZAP Install. Having a machine isn't a requirement for attending, there will be talks and demos as well as the practical elements.

This month's workshop will be divided into three phases:

1. Top 10 2013 - A5 - Security Misconfiguration

Delivered by: Fiona Collins

Security misconfiguration can happen at any level of an application stack, including the platform, web server, application server, database, framework, and custom code. Developers and system administrators need to work together to ensure that the entire stack is configured properly. Automated scanners are useful for detecting missing patches, misconfigurations, use of default accounts, unnecessary services, etc., however these should not be relied upon.

https://www.owasp.org/index.php/Top_10_2013-A5-Security_Misconfiguration

2. Top 10 2013 - A2 - Broken Authentication and Session Management

Delivered by: Darren Fitzpatrick

Developers frequently build custom authentication and session management schemes, but building these correctly is hard. As a result, these custom schemes frequently have flaws in areas such as logout, password management, timeouts, remember me, secret question, account update, etc. Finding such flaws can sometimes be difficult, as each implementation is unique.

https://www.owasp.org/index.php/Top_10_2013-A2-Broken_Authentication_and_Session_Management

3. Top 10 2013 - A6 - Sensitive Data Exposure

Delivered by: Fiona Collins

The most common flaw is simply not encrypting sensitive data. When crypto is employed, weak key generation and management, and weak algorithm usage is common, particularly weak password hashing techniques. Browser weaknesses are very common and easy to detect, but hard to exploit on a large scale. External attackers have difficulty detecting server side flaws due to limited access and they are also usually hard to exploit.

https://www.owasp.org/index.php/Top_10_2013-A6-Sensitive_Data_Exposure

4. Practical Hands On Workshop

This section of the night will invoke our learning from the first phase and put it to practical use. We take our testing environment and use it to exploit some of both types of vulnerabilities on a safe, intentionally vulnerable website.

After giving some time for individually attempting to carry out the exploitation, a walk-through of the exploit technique will be given for each of the examples outlined. The OWASP team will be at hand to help with any issues that might arise through this phase.

The practical elements will allow you attack a vulnerable site from a malicious attacker or software tester's perspective. You will leave with not only an understanding of the issues but also having had hands on practice.

Chapter meetings are provided free of charge although OWASP membership is encouraged and besides supporting the organisation, will provide the holder with benefits in other areas such as free/discounted entry to conferences, etc.

Hope to see you there!

Darren & Fiona (OWASP Cork Team)

Top 10 Workshop #4 (XSS & Unvalidated Redirects and Forwards) - 10 Sept 2015

OWASP Top 10 Workshop #4 (XSS & Unvalidated Redirects and Forwards)
When Where
Thursday 10th Sept 2015

Doors: 19:00
Talks start: 19:10
Venue Location: UCC, Western Gateway Building, Room G09

Venue Address: Western Road, Cork
Venue Map: Google Maps
(Registration. Register here)

SLIDES FOR THIS MONTH

A3 - Cross Site Scripting (XSS) & A10 - Unvalidated Redirects and Forwards

DESCRIPTION

Detecting and Preventing XSS, the Most Common Web App Security Flaw.

On Thursday, September 10th, we are having the fourth of our free series of workshops based on OWASP's most well known flagship project, the OWASP Top 10 (2013) https://www.owasp.org/index.php/Top10. The goal of these workshops is to learn by doing, which is usually the best approach to learning anything. In that light, we will speak a little about each of the areas from the Top 10, then take that learning to the next level by attacking vulnerable sites and investigating vulnerable code and configurations.

This month our guest speaker, Damilare Fagbemi, will mainly be investigating Cross Site Scripting (XSS) which claims the third highest spot (A3) in the top 10 and will also touch on A10 - Unvalidated Redirects and Forwards.

Damilare is a software engineer and information security professional with expertise in Software Security and Data Analytics. He is a software security engineer in the Partner team at Intel Security Group where is responsible for developing strategies to improve security in the software development process while ensuring that software products built and shipped for Intel Security's partners are secure.

damilarefagbeni.com

@damilarefagbemi

Note: During the previous workshops we set up our machines to be ready for web penetration testing. Anyone who has done this can continue as such, but if you have not, no problem, we can help you set up the one or two main tools that we will need for that night. That should only take a couple of minutes. If you would like some assistance in getting set-up then we will be there from 18:45 to help. Alternatively, you can contact one of the organisers (Fiona or Darren) in advance and we will let you know what you need.

If you would like to have ZAP installed on your machine you can get it here: ZAP Install. Having a machine isn't a requirement for attending, there will be talks and demos as well as the practical elements.

This month's workshop will be divided into three phases:

1. Top 10 2013 - A3 - Cross Site Scripting (XSS)

This important vulnerability can result in your application allowing arbitrary code to be run in the unsuspecting browsers of your users, putting those users at risk.

We will discuss how to identify XSS vulnerabilities in your application, highlight the risks associated with injection flaws, provide some mitigation techniques and demonstrate how this all works.

https://www.owasp.org/index.php/Top_10_2013-A3-Cross-Site_Scripting_(XSS)

2. Top 10 2013 - A10 - Unvalidated Redirects and Forwards

An open redirect is a parameter which is accepted and used by the application to redirect a user to a URL of their choosing without any validation. This vulnerability is often used to facilitate phishing attacks.

We will discuss how to identify these vulnerabilities in your application, highlight the associated risks , provide some mitigation techniques and demonstrate how this all works.

https://www.owasp.org/index.php/Top_10_2013-A10-Unvalidated_Redirects_and_Forwards

3. Practical Hands On Workshop

This section of the night will invoke our learning from the first phase and put it to practical use. We take our testing environment and use it to exploit some of both types of vulnerabilities on a safe, intentionally vulnerable website.

After giving some time for individually attempting to carry out the exploitation, a walk-through of the exploit technique will be given for each of the examples outlined. The OWASP team will be at hand to help with any issues that might arise through this phase.

The practical elements will allow you attack a vulnerable site from a malicious attacker or software tester's perspective. You will leave with not only an understanding of the issues but also having had hands on practice.

Chapter meetings are provided free of charge although OWASP membership is encouraged and besides supporting the organisation, will provide the holder with benefits in other areas such as free/discounted entry to conferences, etc.

Top 10 Workshop #3 (Injection) - 28 July 2015

OWASP Top 10 Workshop #3 (Injection)
When Where
Tuesday 28 July 2015

Doors: 19:00
Talks start: 19:10
Venue Location: UCC, Western Gateway Building, Room G09

Venue Address: Western Road, Cork
Venue Map: Google Maps
(Registration. Register here)

SLIDES FOR THIS MONTH

A1 - SQL Injection (SQLi)

DESCRIPTION

Tuesday July 28 will see the third of our free series of workshops based on OWASP's most well known flagship project, the OWASP Top 10 (2013) https://www.owasp.org/index.php/Top10. The goal of these workshops is to learn by doing, which is usually the best approach to learning anything. In that light, we will speak a little about each of the areas from the Top 10, then take that learning to the next level by attacking vulnerable sites and investigating vulnerable code and configurations.

We will also be having our summer social event, with some free food and beer, after the talks - see below for more details.

This month we will be looking at Injection flaws which are #1 in the top 10. This is the top item as successful exploitation can lead to complete control of your systems by a malicious user.

Note: During the previous workshops we set up our machines.

Anyone who has set up their machines during the last workshop can continue to use that and will have all tools in place, but if you have not, no problem, we can just set up the one or two main tools that we will need for that night. If you would like some assistance in getting set-up then we will be there from 18:45 to help. Alternatively, you can contact one of the organisers (Fiona or Darren) in advance and we will let you know what you need.

If you would like to have ZAP installed on your machine you can get it here: ZAP Install. Having a machine isn't a requirement for attending, there will be talks and demos as well as the practical elements.

This month's workshop will be divided into two phases with a networking event after the talks:

1. Top 10 2013 - A1 - Injection

Fiona Collins

Injection flaws, such as SQL, OS, and LDAP injection occur when untrusted data is sent to an interpreter as part of a command or query. The attacker’s hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization. The result of this being that an attacker can by-pass any application level controls in place and gain full remote control of the application or database server which can in turn be used to access other systems on your network.

We will discuss how to identify injection vulnerabilities in your application, highlight the risks associated with injection flaws, provide some mitigation techniques and demonstrate how this all works.

https://www.owasp.org/index.php/Top_10_2013-A1-Injection

2. Practical Hands On Workshop

This section of the night will invoke our learning from the first phase and put it to practical use. We take our testing environment and use it to exploit some injection vulnerabilities on a safe, intentionally vulnerable website.

After giving some time for individually attempting to carry out the exploitation, a walk-through of the exploit technique will be given for each of the examples outlined. The OWASP team will be at hand to help with any issues that might arise through this phase.

The practical elements will allow you attack a vulnerable site from a malicious attacker or software tester's perspective. You will leave with not only an understanding of the issues but also having had hands on practice.

3. Summer Networking Event

After the workshop we will go along to the Woolshed bar where we would like to treat you to some food, drinks and chats: (http://www.woolshedbaa.com/cork/)

Chapter meetings are provided free of charge although OWASP membership is encouraged and besides supporting the organisation, will provide the holder with benefits in other areas such as free/discounted entry to conferences, etc.

Top 10 Workshop #2 (CSRF & Insecure Components) - 25 June 2015

OWASP Top 10 Workshop #2 (CSRF & Insecure Components)
When Where
Thursday 25 June 2015

Doors: 19:00
Talks start: 19:10
Venue Location: UCC, Western Gateway Building, Room G09

Venue Address: Western Road, Cork
Venue Map: Google Maps
(Registration. Register here)

SLIDES FOR THIS MONTH

Cross Site Request Forgery (CSRF)
Using Insecure Components

DESCRIPTION

Thursday 25 June will see the second of our free series of workshops based on OWASP's most well known flagship project, the OWASP Top 10 (2013) https://www.owasp.org/index.php/Top10. The goal of these workshops is to learn by doing, which is usually the best approach to learning anything. In that light, we will speak a little about each of the areas from the Top 10, then take that learning to the next level by attacking vulnerable sites and investigating vulnerable code and configurations.

Note: During the previous workshop we set up our machines.

Anyone who has set up their machines during the last workshop can continue to use that and will have all tools in place, but if you have not, no problem, we can just set up the one or two main tools that we will need for that night. If would like some assistance in getting set-up then we will be there from 18:45 to help. Alternatively, you can contact one of the organisers (Fiona or Darren) in advance and we will let you know what you need.

Having a machine isn't a requirement for attending, there will be talks and demos as well as the practical elements.

This month's workshop will be divided into two phases:

1. Top 10 2013 - A8 - Cross-Site Request Forgery (CSRF)

Vincent Ryan

A CSRF attack forces a logged-on victim’s browser to send a forged HTTP request, including the victim’s session cookie and any other automatically included authentication information, to a vulnerable web application. This allows the attacker to force the victim’s browser to generate requests the vulnerable application thinks are legitimate requests from the victim.

We will discuss what this issue is, a number of varieties of this issue along with methods for avoiding it in your application code and a demo of how you would examine a defence using burp.

https://www.owasp.org/index.php/Top_10_2013-A8-Cross-Site_Request_Forgery_(CSRF)

2. Top 10 2013 - A9 - Using Components with Known Vulnerabilities

Darren Fitzpatrick

Components, such as libraries, frameworks, and other software modules, almost always run with full privileges. If a vulnerable component is exploited, such an attack can facilitate serious data loss or server takeover. Applications using components with known vulnerabilities may undermine application defenses and enable a range of possible attacks and impacts.

We will discuss how know vulnerabilities can be identified in a system and used to get access to other systems and data in your network. Mitigation techniques will also be discussed.

https://www.owasp.org/index.php/Top_10_2013-A9-Using_Components_with_Known_Vulnerabilities

3. Practical Hands On Workshop

This section of the night will invoke our learning from the first phase and put it to practical use. We take our testing environment and use it to exploit some CSRF & component vulnerabilities on a safe, intentionally vulnerable website.

After giving some time for individually attempting to carry out the exploitation, a walk-through of the exploit technique will be given for each of the examples outlined. The OWASP team will be at hand to help with any issues that might arise through this phase.

Top 10 Workshop #1 (Test Environment Setup & Direct Object Reference) - 28 May 2015

OWASP Top 10 Workshop #1 (Test Environment Setup & Direct Object Reference)
When Where
Thursday 28 May 2015

Doors: 19:00
Talks start: 19:10
Venue Location: UCC, Western Gateway Building, Room G09

Venue Address: Western Road, Cork
Venue Map: Google Maps
(Registration. Register here)

SLIDES FOR THIS MONTH

Setting Up a Hacking Environment
Direct Object Reference & Broken Functional Access Control

DESCRIPTION

Thursday 28 May will see the first of our free series of workshops based on OWASP's most well known flagship project, the OWASP Top 10 (2013) https://www.owasp.org/index.php/Top10. The goal of these workshops is to learn by doing, which is usually the best approach to learning anything. In that light, we will speak a little about each of the areas from the Top 10, then take that learning to the next level by attacking vulnerable sites and investigating vulnerable code and configurations.

Note: To get the most out of these workshops, it would be best to bring your own laptop. This should have >1 GB of RAM, >5 GB of free storage and a reasonably fast processor. Failing these laptop requirements we could probably work around it, but this would be best for following the standard approach that will be taken by most.

This month's workshop will be divided into three phases:

1. Setting Up Your Test Environment

To start the night we will define test environments at a high level and then help you to configure VirtualBox with a hacking / penetration testing specific virtual machine, namely Kali Linux. Kali will provide a tailored, pre-configured environment for testing and comes pre-populated with a vast array of tools for all your hacking needs! If you just bring your laptop, we will have the files ready for you to install, or if you are a paranoid security person ;) you can download in advance from here:

https://www.virtualbox.org/wiki/Downloads

https://www.kali.org/downloads/ (32 bit iso)

2. Top 10 2013 - A4 - Insecure Direct Object References

Insecure direct object reference occurs when a web application allows the user to choose the target data for their transaction without correctly restricting to the data to which they should be privy. In a secure configuration, the target data for retrieval would be based on the particular user session, however often the data retrieval decisions are based on parameters which the user can access. E.g. you access your on-line bank account details, but manipulate the incorrectly implemented request to have the application think that you are another user, and return that other user's details.

We will discuss a number of varieties of this issue along with methods for avoiding it in your application code.

https://www.owasp.org/index.php/Top_10_2013-A4-Insecure_Direct_Object_References

3. Practical Hands On Workshop

This section of the night will invoke our learning from the first two phases and put it to practical use. We take our new testing environment and use it to exploit some direct object reference vulnerabilities on a safe, intentionally vulnerable website.

After giving some time for individually attempting to carry out the exploitation, a walk-through of the exploit technique will be given for each of the examples outlined. The OWASP team will be at hand to help with any issues that might arise through this phase.

Practical elements will cover the following two perspectives so that you leave with not only an understanding of the issues but also having had hands on practice in these areas:

1. Defensive - Seeing vulnerable code / configurations and investigating how the issues could be rectified.

2. Offensive - Attacking vulnerable sites from a malicious attacker or software tester's perspective.

Cork Security Event - Mach 24

Amalgamating IT Security Best Practices Within an Organisation

On March 24th we held a joing security event with CorkSec, ISACA, and (ISC)2. Slides from the talks are available here:
Securing Innovation
The Weakest Link


Chapter meetings are provided free of charge although OWASP membership is encouraged and besides supporting the organisation, will provide the holder with benefits in other areas such as free/discounted entry to conferences, etc.

Chapter Meetings - 2014

Details and registration for all chapter meetingsis available on our Meet-Up page: http://www.meetup.com/OWASP-Cork/

OWASP December Event

Chapter Meeting - December 11 2014
When Where
Thursday 11 December 2014

Doors: 19:00
Talks start: 19:15
Venue Location: UCC, Western Gateway Building, Room G04

Venue Address: Western Road, Cork
Venue Map: Google Maps
(Registration. Register here)

DESCRIPTION

The next OWASP Cork Chapter meeting is taking place on Thursday December 11th in UCC (Western Gateway Building, WGB G04) at 7PM.

Hope to see you there. There are two talks lined up:

Talk 1: Eoin Carroll - Android Webview Exploitation

Bio:

Eoin Carroll is an IT Security Engineer and member of OWASP since 2009. Based in Cork and works on all things security with keen interests in the Android Stack, Threat Modeling, HTML5, Cryptanalysis, Reversing and Exploitation.

Eoin has 13 years’ experience spanning across the IT, Semi-Conductor and Medical Device industries, working as an Electronic Engineer for 10 yrs and in Security for the last 3 years.

Android Webview Exploitation

This talk will focus on the AddJavascriptInterface which is remotely exploitable leading to Shell and Cross Application Scripting (XAS). Eoin will discuss the importance of Threat Modeling with cross platform development frameworks such as Phonegap/Cordova as well as security tools such as Drozer and AFE (Android Exploitation Framework).

The session will finish with a MITM demo exploiting the AddJavascriptInterface.

Slides are available here: OWASP Android Webview Explotiation


Talk 2: Eoin Keary & Rahim Jina - 2014 EdgeScan Vulnerability Stats Report

Eoin Keary - BCC Risk Advisory / OWASP

Eoin is international board member and vice chair of OWASP, The Open Web Application Security Project (owasp.org), and during his time in OWASP he has lead the OWASP Testing and Security Code Review Guides and also contributed to OWASP SAMM, and the OWASP Cheat Sheet Series. Eoin is a well-known technical leader in industry in the area of software security and penetration testing, and has led global security engagements for some of the world's largest financial services and consumer products companies. He was a senior manager, responsible for penetration testing in EMEA for a “big 4” professional services firm for 4.5 years. He is the CTO and founder of BCC Risk Advisory Ltd (bccriskadvisory.com) an Irish company who specialise in secure application development, advisory, penetration testing, Mobile & Cloud security and training. Eoin has delivered security training and talks for OWASP to over 600 developers in the past year including events such as RSA (2013), RSA Europe, OWASP EU (2013), OWASP Dublin 2013.

Rahim Jina - BCC Risk Advisory / OWASP

Rahim is a member of OWASP and has contributed to many open source security projects over the past 8 years such as the OWASP Testing and Security Code Review Guides and also OWASP SAMM. Previously Rahim was a senior consultant at a “big 4” professional services for and the head of security for a large VoIP/IPT company in Los Angeles, USA and now works as the Director of information security for BCC Risk Advisory (bccriskadvisory.com). His is also responsible for the security architecture of the edgescan.com vulnerability management solution.


We will go along to the Woolshed bar for some drinks and chats after the talk: (http://www.woolshedbaa.com/cork/)


Chapter meetings are provided free of charge although OWASP membership is encouraged and besides supporting the organisation, will provide the holder with benefits in other areas such as free/discounted entry to conferences, etc.

OWASP September 22nd Event

Chapter Meeting - September 22 2014
When Where
Monday 22nd September

Doors: 19:00
Talks start: 19:15
Venue Location: UCC (WGB G.14)

Venue Address: Western Gateway Building, UCC, Western Rd, Cork, Ireland
Venue Map: Google Maps
(Registration. Register here)

DESCRIPTION

The next OWASP Cork Chapter meeting is taking place on Monday September 22nd in UCC (WGB G.14) at 7PM.

We would like to treat all attendees to some beer and pizza after the talks in the Woolshed bar (Mardyke - http://www.woolshedbaa.com/cork/)

Hope to see you there.

There are two talks lined up:

Talk 1: Introduction to OWASP ZAP

Overview of the OWASP ZAP tool.

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications.

It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing.

ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.


Talk 2: Mark Denihan - OWASP Security Shepherd

The OWASP Security Shepherd project has been designed and implemented with the aim of fostering and improving security awareness among a varied skill set demographic. Shepherd covers the OWASP Top Ten web app risks and has recently been injected with totally new content to cover the OWASP Top Ten Mobile risks as well. Many of these levels include insufficient mitigations and protections to these risks, such as blacklist filters, atrocious encoding schemes, barbaric security mechanisms and poor security configuration. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well. In this presentation we're going to look at the Shepherd platform itself from both a learning and teaching perspective. Some of Shepherd's lessons and challenges will be demonstrated and we'll also walkthrough how easy it is to stand up a Security Shepherd instance and how it can be tailored to suit any web/mobile app sec teaching environments.


Chapter meetings are provided free of charge although OWASP membership is encouraged and besides supporting the organisation, will provide the holder with benefits in other areas such as free/discounted entry to conferences, etc.

OWASP September 2nd Event - Joint Event with CorkSec

Chapter Meeting - Joint event with CorkSec
When Where
Tuesday 2nd September

Doors: 19:00
Talks start: 19:15
Venue Location: SoHo

Venue Address: Grand Parade, Cork, Ireland
Venue Map: Google Maps
(Registration. Register here)

DESCRIPTION

The first OWASP Cork Chapter meeting is taking place on Tuesday September 1st upstairs in SoHo bar on Grand Parade. This meeting is a joint event with the CorkSec group (http://www.meetup.com/CorkSec/). We would love if you could stay around after for a chat and some networking.

There are two talks lined up:

Talk 1: Web to Shell by Darren Fitzpatrick

Darren will introduce the concept of getting a shell through a website. This basically means remotely taking over the server on which a web application is installed. After a little theory, he will go about delivering demonstrations of this in action. Demos will include common attack vectors of this type and one recent and quite common ruby on rails specific remote exploit.


Talk 2: How I got into Security by Jack Baylor

In this short talk I'll be covering:

  • my education and previous work experience
  • what courses I wish I'd covered but didn't
  • how I got interested initially
  • how I started researching and networking
  • how I came about working in Qualcomm
  • how some others broke into security (through polling others here and through talking to people on LinkedIn etc...),
  • what courses I intend to take in the next 1, 2 and 5 years

Everyone is welcome to join us at our chapter meetings.

Other OWASP Chapters in Ireland

OWASP Dublin

https://www.owasp.org/index.php/Ireland-Dublin


OWASP Limerick

https://www.owasp.org/index.php/Limerick