Difference between revisions of "Atlanta Member Meeting 02.25.10"

From OWASP
Jump to: navigation, search
(Created page with '===25th of Feb Meeting=== '''WHAT::''' Embedded Malicious Javascript '''WHEN::''' February 25, 2010 6-8pm '''WHERE::''' Room 1447 , Klaus Advanced Computing Building, Georgia…')
 
(25th of Feb Meeting)
 
Line 16: Line 16:
  
  
'''''Download Presentation''''': [[File:OWASP Atlanta Feb 25 2010.pdf]]
+
'''''Download Presentation''''': [[File:OWASP_Atlanta_Feb_25_2010.ppt]]

Latest revision as of 00:21, 5 March 2010

25th of Feb Meeting

WHAT:: Embedded Malicious Javascript

WHEN:: February 25, 2010 6-8pm

WHERE:: Room 1447 , Klaus Advanced Computing Building, Georgia Tech :: Web :: Google Maps ::

  • Parking spots: Parking Map - Physics building (Area 4)
  • Campus Bus: Tech trolley runs between Midtown Marta and the venue

WHO:: Nick Chapman, SecureWorks

ABSTRACT:: This talk will cover malicious JavaScript currently being used in the wild. It will start with the big daddy of embedded malicious JavaScript, Asprox, which last year gave rise to panicked headlines like "100,000s of websites compromised" and continuing through more recent samples such as the fake Yahoo Counter and the recent MS09-002 exploits. We will look at attack vectors, obfuscation techniques, and multi-stage delivery systems, and exploits used. This will feature the analysis of several samples harvest from the wilds of the Internet.

Bio: My name is Nick Chapman. I'm a security researcher with the SecureWorks Counter-Threat Unit. Prior to focusing on security issues full time, I worked as both a System Administrator and Network Engineer in the ISP world.


Download Presentation: File:OWASP Atlanta Feb 25 2010.ppt