8th OWASP IL chapter meeting
At Watchfire, Herzliya, Wednesday, September 5th 2007, 17:00Global Security Week.
You can find instructions on how to get to Watchfire office in the Media:Owasp_il_map_to_watchfire_offices.gif map. Parking lots which charge a flat reasonable fee are marked on the map.
The agenda of the meeting is:
16:45 – 17:00 Gathering and refreshments
17:00 – 17:15 OWASP Updates
17:15 – 18:00 Straight from Blackhat: Dangling Pointers
Jonathan Afek, Senior Security Researcher, Watchfire
Jonthan will bring to us his acclaimed Blackhat presentation. Dangling pointers are a common programming error, but even OWASP experts assumed, until now, that exploiting this vulnerability can lead only to crashes and therefore only to denial of service attacks (see OWASP vulnerability guide). The research team at Watchfire proved that dangling pointers can be exploited to take control of a vulnerable system, elevating the severity of dangling pointers.
The presentation will explain the vulnerability and demonstrate a real exploit of the vulnerability using IIS as an example.
18:00 – 18:15 Break
18:15 – 19:00 Evasive Crimeware attacks, Business drivers, and Proposed Defense
Iftach Amit, Director Security Research, Finjan
Any web based attack requires a business model in order to spread. As the director of research for Finjan, Iftach monitors the highly successful web attacks focusing on client abuse and malware installation and the community that creates them. In the presentation Iftach will share with us his research findings.
The presentation will cover the business drivers of client side attack vectors, explore recent examples of such attacks with an eye-opening review of the attacker community and its operation methods, and conclude with a technical discussion of the cat and mouse game between cutting edge solutions and ever advancing attack vectors.
19:00 – 19:30 Content Injection as a solution for client side browser vulnerabilities
Ofer Shezaf, OWASP IL Leader; CTO, Breach Security, Breach Security
As we have seen in Iftach's presentation, clients are not very secure. While we, as web site owners, may not be directly responsible, this situation is just as much a problem for us: law might hold us responsible and the conquered and potentially trusted client may pose a risk to our web site. Good examples of problems which blurs the lines between client and server are the Universal PDF XSS and Cross Site Request Forgery.
Content Injection is a method proposed by Ivan Ristic, the creator of ModSecurity to enable a Web Application Firewall to protect against this family of problems. The presentation will explain this novel method and build on it to offer some practical recipes for protection against client side problems.