OWASP EEE Bucharest Event 2015

From OWASP
Jump to: navigation, search


Owasp_eee.jpg
OWASP Eastern European Event - Bucharest Event, 9th of October 2015

OWASP EEE - Bucharest Event 2015 - October 9th

OWASP Bucharest team is happy to announce the OWASP Bucharest Event 2015, part of OWASP EEE, a one day Security and Hacking Conference. It will take place on 9th of October, 2015 - Bucharest, Romania.

The objective of the OWASP's Eastern European Event is to raise awareness about application security and to bring high-quality security content provided by renowned professionals in the European region. Everyone is free to participate in OWASP and all our materials are available under a free and open software license.

This initiative will enable participants to get the most out of OWASP events and meetings in the region. During approximately a week OWASP chapters will organize events and meetings that will be broadcasted live so that every day people could watch presentations from another chapter.

Who Should Attend?

  • Application Developers
  • Application Testers and Quality Assurance
  • Application Project Management and Staff
  • Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff
  • Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance
  • Security Managers and Staff
  • Executives, Managers, and Staff Responsible for IT Security Governance
  • IT Professionals Interesting in Improving IT Security
  • Anyone interested in learning about or promoting Web Application Security

Call for papers is now open! Apply here!

CONFERENCE (Friday 9th of October)

Date Location
Friday 9th of October, 10.00 AM
Venue Location: Institutul National de Statistica

Conference:Sala Amfiteatru Workshop:Sala Albastra
Venue Address: 16 Libertatii Bvd., Bucuresti, ROMANIA;

Price and registration
The conference entrance is FREE, you need to register on the link provided below, print your ticket and present it at the entrance.

General Registration
OWASP Top 10 vulnerabilities – from discovery to complete exploitation - Workshop Registration
Limited number of seats! Register now!


Sponshorship opportunities
Why sponsor?

  • Join 200+ leaders, security consultants, security architects and developers gathered to share cutting-edge ideas, initiatives and trends in technology.
  • OWASP events attract an audience interested in "What's next?" - As a sponsor, you will be promoted as an answer to this question.
  • Increase awareness and recognition in Romanian Security IT environment.
  • Support and involvement in the world of information security enthusiasts.

Conference agenda

Time Title Speaker Description
8:30 - 9:00
(30 mins)
Registration
9:15 - 10:00
(45 mins)
From SCADA to IoT - Cyber Security Bogdan Matache The presentation dwells on the distinctive issues of cybersecurity in the world of Internet of Things (IoT). It starts with a short overview of the entities and trends of IoT: Industrial Control Systems (ICS), SCADA, consumer IoT, communication protocols and operating modes, threats and vulnerabilities for ICS / IoT. The presentation moves on to illustrating protection profiles, non-invasive penetration testing for ICS/IoT and finishes with a few consideration on building and operating a security operation center for SCADA / ICS / IoT.
10:00 - 10:45
(45 mins)
Application security, Gamification and how they fit together Amit Ashbel While studies clearly show a majority of cyber-attacks initiate at the Application level, both web and mobile application development is booming and it seems that security was left behind… again.

Agile development, Continuous integration and Devops methodologies allow organizations to frequently release new and updated functionality.
Can application security keep up? What solutions can rise to the challenge and how can they make your life easier?

In this session you will learn:
• What are the main Application Security solutions, and what are their pros and cons?
• How can developers screw it up and how can they be the key to a successful application security program?
• How and why education should be at the core of application security?

11:00 - 11:45
(45 mins)
XML Based Attacks
Daniel Tomescu
The presentation is focused on general and specific attack vectors in applications that use XML and additional technologies. The audience will learn how some of the OWASP Top 10 vulnerabilities can be reproduced using XML vectors, how XML External Entities can be used in order to read local files and how XML can be used in order to cause Denial of Service in vulnerable applications.
12:00 - 12:45
(45 mins)
Dark appsec made simple Alexander Antukh In this talk I would like to present results of my security research of applications in the "darknet" - a place where even low-risk vulnerabilities can become crucial for successful de-anonymization. We will go through different techniques of de-anonymizing subjects and will see that privacy is much harder topic than it appears to be. Finally, some vulnerabilities in real well-known services will be presented.
12:55 - 13:40
(45 mins)
Attack is easy, let's talk defence. From threat modelling to intelligence driven defence. Teodor Cimpoesu and Cosmin Anghel Warfare is hard in asymmetric territories, and while cyber realm favours offence, defence is even harder. Modern cyber security talks about adversaries and threat actors, attack modelling and defence chain. But little information is about implementing these concepts. We propose to have a look at the modern approaches of taming security complexity by implementing intelligence driven defence in the day-to-day operations.
13:40 - 14:30
(50 mins)
Lunch/Coffee Break
14:30 - 15:15
(45 mins)
Your Intents are dirty, droid Ionescu Razvan-Costin and Stefania Popescu Analyzing the Inter-Process Communication mechanism and monitoring how applications communicate through intents is essential for the integrity of the Android system.

Drozer is a comprehensive security attack framework for Android. It can analyse the Android’s Inter-Process Communication (IPC) mechanism and interact with the underlying operating system. Drozer also helps us to remotely exploit Android devices. At this moment Drozer doesn’t provide fuzzing testing on the intents in Android. This presentation aims to present a new Drozer module, “Fuzzinozer”, which allows us to send fuzzed intents to the applications installed on the Android device, analyse the system logcat and collect information based on which of the intents have generated crashes.
After a session of intents is run, the module parses the saved logcat and creates seed files. A seed file is generated when an intent crash is produced and it contains the list of all intents that have been executed until the moment of the crash. Using this functionality, we can recreate the same testing environment so we can retest a session of intents to see if the crash happens again.

15:20 - 16:05
(45 mins)
Reversing the Apple Sandbox Razvan Deaconescu Apple OSes (Mac OS X and iOS) use a variety of security mechanisms, one of which is sandboxing. Sandboxing uses kernel-based support to enforce strict operations for a given application. However,documentation for the Apple sandboxing is scarce and only few people have delved into its internals.

In this talk we present the process of reversing Apple sandbox profiles allowing us to shed light into its inner workings, particulary for iOS. We base our work on previous work by Dionysus Blazakis and Stefan Esser and we extract information on the runtime sandboxing environment of iOS Apps.

16:10 - 16:55
(45 mins)
Catching up with today's malicious actors Adrian Ifrim Current approaches to cyber security do not respond adequately to changing technology or threat conditions. Repeated cyber intrusions into critical infrastructure demonstrate the need for improved cyber security. Traditional ways of protecting our networks are clearly not working anymore. This presentation will help you get a glimpse at what are your current solutions and what you need to expect from the future.

Workshop

Time Title Trainers Description
9:00 - 14:00
(5 hours)
Sala Albastra
OWASP Top 10 vulnerabilities – from discovery to complete exploitation
The purpose of this workshop is to increase the participants’ awareness on the most common web application vulnerabilities and their associated risks.

We will discuss each type of vulnerability described in the OWASP Top 10 project and we will be practicing manual discovery and exploitation techniques.

Adrian Furtună – Technical Manager – Security Services – KPMG Romania
Ionuţ Ambrosie – Security Consultant – KPMG Romania
Description:

This will be a (very) hands-on workshop where we will practice exercises as:

  • Discover SQL injection and exploit it to extract information from the database
  • Find OS command injection and exploit it to execute arbitrary commands on the target server
  • Discover Cross-Site Scripting and exploit it to gain access to another user’s web session
  • Identify Local File Inclusion and exploit it to gain remote command execution
  • Find Cross-Site Request Forgery and exploit it to gain access to the admin panel
  • Other fun and challenging tasks

Of course, we will also present safe ways in which the identified vulnerabilities can be eliminated or mitigated in a production environment.
Intended audience: Web application developers, security testers, quality assurance personnel, people passionate about web security
Skill level: Intermediate
Requirements: - Laptop with a working operating system

  • At least 2 GB of free disk space and at least 2 GB RAM
  • Administrative rights on the laptop
  • VMWare Player installed

Seats available: 20 (first-come, first served)
Register here



  • Oana Cornea [1]
  • Adrian Furtuna [2]
  • Daniel Barbu [3]
  • Catalin Teodorescu [4]
  • Cosmin Ilie [5]


Sponsors

      []      
     

Silver Sponsor

     
    Sigla ea alpha.jpg CheckmarxIL.jpg  
    Dell-logo.png KPMG RGB.jpg  
     

Event Supporters

     
    RST.jpg Defcamp logo.png Peerlyst logo.png  
    SoftLead.png Dev hacks.jpg Danielbarbu.png  
    Dev talks.jpg Security-cafe1.png Logo-cert-ro-final.png  
    EU-cyberS.jpg Romania4cL.jpg Logo-C.jpg  
    [] [] []