Difference between revisions of "Cambridge"

From OWASP
Jump to: navigation, search
 
(14 intermediate revisions by 2 users not shown)
Line 1: Line 1:
 
{{Chapter Template|chaptername=Cambridge|extra=The chapter leaders are [mailto:Adrian.Winckles@owasp.org Adrian Winckles ]  and [mailto:Steven.van.der.Baan@owasp.org Steven van der Baan].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Cambridge|emailarchives=http://lists.owasp.org/pipermail/owasp-Cambridge}}
 
{{Chapter Template|chaptername=Cambridge|extra=The chapter leaders are [mailto:Adrian.Winckles@owasp.org Adrian Winckles ]  and [mailto:Steven.van.der.Baan@owasp.org Steven van der Baan].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Cambridge|emailarchives=http://lists.owasp.org/pipermail/owasp-Cambridge}}
  
== Local News ==
+
<paypal>Cambridge</paypal>
 +
<!-- first tab -->
 +
= Local News =
 +
==='''Local News'''===
 +
'''Cambridge OWASP Chapter Meeting
  
'''Cambridge OWASP Chapter Meeting  - Mobile Forensics & Pen Testing'''
+
Tuesday 1st April 17:30 – 20:30 (Anglia Ruskin University, East ROad, Cambridge LAB003)
 
+
Tuesday 5th March 2013 17:00 – 20:00 (Anglia Ruskin University, East ROad, Cambridge LAB002/LAB006)
+
  
 
Hosted by the Department of Computing & Technology, Anglia Ruskin University, OWASP (Open Web Application Security Project) Cambridge Chapter and IEEE Industrial Electronics Chapter
 
Hosted by the Department of Computing & Technology, Anglia Ruskin University, OWASP (Open Web Application Security Project) Cambridge Chapter and IEEE Industrial Electronics Chapter
Line 11: Line 13:
 
'''Guest speaker(s):'''
 
'''Guest speaker(s):'''
  
Sarantis Makoudis is a professional Penetration Tester working for 7Safe, part of the PA Consulting Group. He received his BSc Degree on Digital Systems during 2010 and decided to continue his academic career on the subject of IT Security. He was awarded with an MSc degree on Information Security from Royal Holloway, University of London after completing his thesis on “Two-Factor authentication protocols for Secure Transactions using Mobile Phones and NFC Tags”. Sarantis joined 7Safe shortly afterwards as a Penetration Tester and security researcher, specialised in Web application security testing.
+
'''Ian Glover (CREST):'''
  
Android (in)Security: The goal of this presentation is to show typical exploitation scenarios of Android applications and how they can be used or manipulated to steal credentials and information from a user. The scenarios include installation of malicious programs, e.g. malicious keyboards, manipulations on the application to bypass security authentications, code injections inside an apk and phishing attacks targeting specific applications.
+
Ian is the President of the Council of Registered Ethical Security Testers (CREST). CREST is a not for profit organisation established to help develop professionalism within the information technology security testing community. The Register is used by organisations to gain a level of assurance that the security testers are competent and that the organisations they work for have appropriate processes and controls in place to protect their information. The CREST qualifications have been assessed and are recognised by the UK government. The qualifications are a mandatory requirement for individuals carry out penetration testing work on government systems.
 
+
Nikhil Sreekumar is a penetration tester working for UK based organisation - 7Safe, part of PA Consulting Group. He spends a majority of his free time either rock climbing, dreaming about cars or researching new vulnerabilities and attack techniques. And, when we gets time he spends time assessing web applications and network infrastructure for security vulnerabilities and business logic flaws.
+
 
+
Power On, Powershell: The heart starts pounding, the brain goes into overdrive with adrenaline and a smile starts appearing. You just got access into a Windows box using a user account. Then you realise there is an AV runing on the system, and the user account using which you got in is actually a restricted account.
+
  
 +
Title : Overview of the CREST activities to professionalise the industry.
  
 +
Overview of the CREST activities to professionalise the industry.  The recent CESG initiative to define the penetration testing role and the new Cyber Hygiene scheme
 
----
 
----
  
Line 25: Line 25:
 
'''Agenda'''
 
'''Agenda'''
  
17:30 – 17:45 Welcome from the OWASP Cambridge Chapter Leader,  Adrian Winckles, Senior Lecturer in  Information Security, Anglia Ruskin University   
+
17:30 – 17:45 Welcome from the OWASP Cambridge Chapter Leader,  Adrian Winckles, Course Leader in  Information Security & Forensic Computing, Anglia Ruskin University   
  
17:45 – 18:30 Nikhil Sreekumar (7Safe, PA Consulting) - Power On, Powershell:
+
17:45 – 18:15  OWASP AppSec Europe 2014 - Cambridge 23rd to 26th June 2014 – What’s On and How do I get Involved  - Adrian Winckles
  
18:30 – 19:15 Sarantis Makoudis (7Safe, PA Consulting) - Android (in)Security
+
18:15 – 19:15 Ian Glover – CREST/IISP - Overview of the CREST activities to professionalise the industry.
  
19:15 – 19:30 Q & A
+
19:15 – 19:30 Q & A – Further meetings and ideas.
 +
19:30 – 20:00 Speaker TBD
 +
20:00 – 20:30  Refreshments & Networking (coffee, tea, juice) in LAB006
  
19:30 – 20:00  Refreshments & Networking (coffee, tea, juice) in LAB006
 
  
 
----
 
----
Line 39: Line 40:
 
'''Registration:'''  
 
'''Registration:'''  
  
To register for this free event, please register online at
+
To register for this free event, please register online  
 +
[https://www.surveymonkey.com/s/OWASP_Cambs_Apr2014 here]
  
[http://www.surveymonkey.com/s/CQ9G6N7] Cambridge Chapter Registration
+
The conference will be held in the Lord Ashcroft Building, Room LAB003 (Breakout Room LAB006 for networking & refreshments).
 
+
Please note there is no automatic notification or confirmation.
+
 
+
 
+
The conference will be held in the Lord Ashcroft Building, Room LAB002 (Breakout Room LAB006 for networking & refreshments).
+
  
 
Please enter through the Helmore Building and ask at reception.
 
Please enter through the Helmore Building and ask at reception.
Line 65: Line 62:
 
Everyone is welcome to join us at our chapter meetings.
 
Everyone is welcome to join us at our chapter meetings.
  
[[Category:OWASP Chapter]]
+
<!-- second tab -->
[[Category:United Kingdom]]
+
= Talks & Abstract =
 +
==='''Next talks'''===
 +
 
 +
{|class="wikitable" border="1" |
 +
|- valign="top" align="left"
 +
! width="150" | Name Speaker
 +
| Yiannis Chrysanthou (KPMG)
 +
|- valign="top" align="left"
 +
! Bio
 +
| Yiannis has been in the information security field for about 6 years now. Prior to joining KPMG, he was an Ethical Hacking Instructor and a Project Manager for various infrastructure projects.
 +
He is an active member of Team Hashcat. Winner of Crackmeifyoucan competition at Defcon (2nd place in 2013,1st place in 2012, 2nd place in 2011 and 1st place in 2010), Winner of Positive Hackdays / Hashrunner (1st place 2012,2nd place 2013).
 +
|- valign="top" align="left"
 +
! Title
 +
| Modern Password Cracking
 +
|- valign="top" align="left"
 +
! Abstract
 +
| This presentation briefly describes the most popular password cracking techniques. It then suggests an optimized attack that combines several techniques with best performance in mind. The presentation suggests the use of Markov Chains for password recovery, in combination with a range of other modified versions of common attacks.
 +
 
 +
All attacks work together and make use of common resources such as Dictionaries, and Rulesets to achieve the most optimal output possible. The result is a dynamic, highly flexible and robust attack that can be used by anyone with average computer literacy and limited resources within reasonable time.
 +
|-
 +
|
 +
|- valign="top"  align="left"
 +
! Name Speaker
 +
| Damien King (KPMG)
 +
|- valign="top" align="left"
 +
! Bio
 +
| Damien has 1st class BSc Applied Computer Science; Distinction &  MSc Information Security; Dissertation in Mobile Device Exploitation. 
 +
 
 +
He is currently a Penetration Tester at KPMG focusing on mobile and web application security.
 +
 
 +
He also have an interest in automation/scripting in python - hence the exploitation tool he will present. 
 +
|- valign="top" align="left"
 +
! Title
 +
| Filename Enumeration with TildeTool
 +
|- valign="top" align="left"
 +
! Abstract
 +
| In certain versions of Microsoft IIS, it is possible to detect the short names of files and directories which have an 8.3 file naming scheme (e.g. FILENA~1.TXT) equivalent in Windows.
 +
 
 +
This issue particularly affects .Net websites that are vulnerable to direct URL access, as an attacker can find important files and folders that they are not normally visible.
 +
 
 +
We will first talk through the steps of how to test for this vulnerability manually, then demonstrate 'TildeTool' which automates the process.
 +
|}
 +
 
 +
 
 +
<!-- second tab -->
 +
= Past Events =
 +
{|class="wikitable" border="1" style="text-align:center;"|
 +
! width="300" | Date
 +
! width="350" | Name / Title
 +
! width="300" | Link
 +
|-
 +
| 5th March 2013
 +
| Sarantis Makoudis / Android (in)Security
 +
| [[Media:20130305-sarantis.pdf|presentation]]
 +
|-
 +
| 5th March 2013
 +
| Nikhil Sreekumar / Power On, Powershell
 +
| [http://www.slideshare.net/Roo7break/power-on-powershell presentation]
 +
|-
 +
| 12th November 2013
 +
| Paul Cain / Tracking Data using Forensics
 +
|
 +
|-
 +
| 12th November 2013
 +
| James Forshaw/ The Forger's Art: Exploiting XML Digital Signature Implementations
 +
|
 +
|}
 +
 
 +
<!-- Don't remove this tag -->
 +
__NOTOC__
 +
<headertabs/>

Latest revision as of 10:38, 21 March 2014

OWASP Cambridge

Welcome to the Cambridge chapter homepage. The chapter leaders are Adrian Winckles and Steven van der Baan.
Click here to join the local chapter mailing list.

Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is and open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter.

Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG

funds to OWASP earmarked for Cambridge.

[edit]

Local News

Cambridge OWASP Chapter Meeting

Tuesday 1st April 17:30 – 20:30 (Anglia Ruskin University, East ROad, Cambridge LAB003)

Hosted by the Department of Computing & Technology, Anglia Ruskin University, OWASP (Open Web Application Security Project) Cambridge Chapter and IEEE Industrial Electronics Chapter

Guest speaker(s):

Ian Glover (CREST):

Ian is the President of the Council of Registered Ethical Security Testers (CREST). CREST is a not for profit organisation established to help develop professionalism within the information technology security testing community. The Register is used by organisations to gain a level of assurance that the security testers are competent and that the organisations they work for have appropriate processes and controls in place to protect their information. The CREST qualifications have been assessed and are recognised by the UK government. The qualifications are a mandatory requirement for individuals carry out penetration testing work on government systems.

Title : Overview of the CREST activities to professionalise the industry.

Overview of the CREST activities to professionalise the industry. The recent CESG initiative to define the penetration testing role and the new Cyber Hygiene scheme



Agenda

17:30 – 17:45 Welcome from the OWASP Cambridge Chapter Leader, Adrian Winckles, Course Leader in Information Security & Forensic Computing, Anglia Ruskin University

17:45 – 18:15 OWASP AppSec Europe 2014 - Cambridge 23rd to 26th June 2014 – What’s On and How do I get Involved - Adrian Winckles

18:15 – 19:15 Ian Glover – CREST/IISP - Overview of the CREST activities to professionalise the industry.

19:15 – 19:30 Q & A – Further meetings and ideas. 19:30 – 20:00 Speaker TBD 20:00 – 20:30 Refreshments & Networking (coffee, tea, juice) in LAB006



Registration:

To register for this free event, please register online here

The conference will be held in the Lord Ashcroft Building, Room LAB003 (Breakout Room LAB006 for networking & refreshments).

Please enter through the Helmore Building and ask at reception.

Anglia Ruskin University Cambridge Campus East Road Cambridge CB1 1PT

Get further information on travelling to the university.

http://www.anglia.ac.uk/ruskin/en/home/your_university/anglia_ruskin_campuses/cambridge_campus/find_cambridge.html


Meeting Location

Everyone is welcome to join us at our chapter meetings.

Next talks

Name Speaker Yiannis Chrysanthou (KPMG)
Bio Yiannis has been in the information security field for about 6 years now. Prior to joining KPMG, he was an Ethical Hacking Instructor and a Project Manager for various infrastructure projects.

He is an active member of Team Hashcat. Winner of Crackmeifyoucan competition at Defcon (2nd place in 2013,1st place in 2012, 2nd place in 2011 and 1st place in 2010), Winner of Positive Hackdays / Hashrunner (1st place 2012,2nd place 2013).

Title Modern Password Cracking
Abstract This presentation briefly describes the most popular password cracking techniques. It then suggests an optimized attack that combines several techniques with best performance in mind. The presentation suggests the use of Markov Chains for password recovery, in combination with a range of other modified versions of common attacks.

All attacks work together and make use of common resources such as Dictionaries, and Rulesets to achieve the most optimal output possible. The result is a dynamic, highly flexible and robust attack that can be used by anyone with average computer literacy and limited resources within reasonable time.

Name Speaker Damien King (KPMG)
Bio Damien has 1st class BSc Applied Computer Science; Distinction & MSc Information Security; Dissertation in Mobile Device Exploitation. 

He is currently a Penetration Tester at KPMG focusing on mobile and web application security.

He also have an interest in automation/scripting in python - hence the exploitation tool he will present.

Title Filename Enumeration with TildeTool
Abstract In certain versions of Microsoft IIS, it is possible to detect the short names of files and directories which have an 8.3 file naming scheme (e.g. FILENA~1.TXT) equivalent in Windows.

This issue particularly affects .Net websites that are vulnerable to direct URL access, as an attacker can find important files and folders that they are not normally visible.

We will first talk through the steps of how to test for this vulnerability manually, then demonstrate 'TildeTool' which automates the process.


Date Name / Title Link
5th March 2013 Sarantis Makoudis / Android (in)Security presentation
5th March 2013 Nikhil Sreekumar / Power On, Powershell presentation
12th November 2013 Paul Cain / Tracking Data using Forensics
12th November 2013 James Forshaw/ The Forger's Art: Exploiting XML Digital Signature Implementations