Difference between revisions of "BeNeLux09 - Web Application Firewalls: Detection, Bypassing and Exploitation"

From OWASP
Jump to: navigation, search
(categorie OWASP WAF)
 
Line 9: Line 9:
 
[[Image:Sandrogauci.jpg|right|200px]]Sandro Gauci is the owner and Founder of EnableSecurity where he performs R&D and security consultancy for mid-sized companies. Sandro has over 9  years experience in the security industry and is focused on analysis of security challenges and providing solutions to such threats. His passion is vulnerability research and has previously worked together with various vendors such as Microsoft and Sun to fix security holes.
 
[[Image:Sandrogauci.jpg|right|200px]]Sandro Gauci is the owner and Founder of EnableSecurity where he performs R&D and security consultancy for mid-sized companies. Sandro has over 9  years experience in the security industry and is focused on analysis of security challenges and providing solutions to such threats. His passion is vulnerability research and has previously worked together with various vendors such as Microsoft and Sun to fix security holes.
  
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_09]]
+
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_09]] [[Category:OWASP WAF]]

Latest revision as of 16:24, 5 July 2012

The presentation

WAFs or Web Application Firewalls are being deployed to fix security issues in your web applications. The question is, are they?

In this presentation we take a look at some of the issues related to making use of this solution and how it may affect the overall security posture of your web application. Finally we will describe tools to automate detection of WAFs, and also tools to help identify ways to bypass WAFs.

The speaker

Sandrogauci.jpg
Sandro Gauci is the owner and Founder of EnableSecurity where he performs R&D and security consultancy for mid-sized companies. Sandro has over 9 years experience in the security industry and is focused on analysis of security challenges and providing solutions to such threats. His passion is vulnerability research and has previously worked together with various vendors such as Microsoft and Sun to fix security holes.