Difference between revisions of "Cambridge"

From OWASP
Jump to: navigation, search
m
(Local News)
 
(11 intermediate revisions by 2 users not shown)
Line 7: Line 7:
 
'''Cambridge OWASP Chapter Meeting
 
'''Cambridge OWASP Chapter Meeting
  
Tuesday 12th November 2013 17:30 – 20:30 (Anglia Ruskin University, East ROad, Cambridge LAB002/LAB107)
+
Tuesday 10th February 2015 17:30 – 20:30, Lord Ashcroft Building (LAB003), Anglia Ruskin University, Cambridge.
 +
Hosted by the Department of Computing & Technology, Anglia Ruskin University, OWASP (Open Web Application Security Project) Cambridge Chapter
  
Hosted by the Department of Computing & Technology, Anglia Ruskin University, OWASP (Open Web Application Security Project) Cambridge Chapter and IEEE Industrial Electronics Chapter
+
'''Guest speakers: Steven van der Baan'''
  
'''Guest speaker(s):'''
+
Steven is a passionate Security Consultant and Software Architect, with a broad history in software development and architecture.  He is currently a Principle Security Consultant with 7Safe/PA Consulting.  Steven has a varied background in developing complex systems, mainly in Java. He has the capability to analyse problems and provide sound advice on possible solutions. He can also design a solution that fits the wishes of the client.
  
'''Paul Cain:'''
+
In his daily work, Steven is responsible for education in application security matters, advice and implementation of application security measures, performing code and design review and executing web-application security assessments. Steven started as a Core Java developer, grew into the role of Software architect and then made the transfer to application security. Steven has the ISC2, OSCP (Offensive Security Certified Professional) and Java certifications.  
Over 12 years experience working in the field of computer forensics.
+
Cutting the bytes within law enforcement more recently within a commercial environment. Conducting investigations on digital devices, providing witness evidence in court and author / teacher of the 7Safe forensic courses.
+
  
'''James Forshaw:'''
+
Steven is currenty Project manager of the OWASP Capture the Flag (CTF) project.
James is the Head of Vulnerability Research at Context Information Security in the UK. He has been involved with computer hardware and software security for over 10 years with a skill set which covers the bread and butter of the security industry such as application testing, through to more bespoke product assessment, vulnerability analysis and exploitation. He has numerous public vulnerabilities disclosures in many different products including web browser issues and virtual machine breakouts as well as being a Pwn2Own and Microsoft Mitigation Bypass bounty winner.
+
  
He has spoken at a number of security conferences in the past, on a range of different topics such including managed language security at Blackhat USA, CanSecWest and Bluehat, Sony Playstation Portable hacking at Chaos Computer Congress, WebGL exploitation at Ruxcon and Citrix network exploitation at Blackhat Europe. He is also the developer of the free CANAPE networking analysis and exploitation tool.
+
'''Title : Web Application Security Testing with Burp Suite'''
  
----
+
Ever wondered how tools like Burp Suite are used by penetration testers and software security testers to evaluate the robustness of enterprise web applications?
 +
 
 +
Steven van der Baan will be running a workshop on how to use Burp Suite to find vulnerabilities in a variety of web application scenarios.  Using “Capture the Flag” scenario’s which have been successfully deployed at both OWASP AppSec and other information security conferences and guidance from the speaker, you will have the opportunity to experience the tools first hand.
  
 +
Bring along your laptop (and a wireless card) with Burp Suite installed (potentially this could be part of Kali Live CD, USB or running as a VM)----
  
 
'''Agenda'''
 
'''Agenda'''
  
17:30 – 17:45 Welcome from the OWASP Cambridge Chapter Leader, Adrian Winckles, Senior Lecturer in Information Security, Anglia Ruskin University
+
17:30 – 17:45 Welcome from the OWASP Cambridge Chapter Leader, Adrian Winckles, Course Leader in Information Security & Forensic Computing, Anglia Ruskin University
  
17:45 – 18:30 Paul Cain  (7Safe, PA Consulting) - Tracking Data using Forensics
+
17:45 – 19:15 Web Application Security Testing with Burp Suite – Steven van der Baan
  
18:30 – 19:15 James Forshaw (Context Information Security) - The Forger's Art: Exploiting XML Digital Signature Implementations
+
19:15 – 19:30 Q & A – Further meetings and ideas.
 
+
19:15 – 19:30 Q & A
+
 
+
19:30 20:00  Refreshments & Networking (coffee, tea, juice) in LAB006
+
  
 +
19:45 – 20:30 Refreshments & Networking (coffee, tea, juice) in LAB006
 
----
 
----
  
 
'''Registration:'''  
 
'''Registration:'''  
  
To register for this free event, please register online at
+
To register for this free event, please register online  
 +
[https://www.surveymonkey.com/s/OWASP_Cambs_Dec2014 here]
  
[http://www.eventbrite.com/event/9178305559 Cambridge Chapter Registration]
+
The conference will be held in the Lord Ashcroft Building, Room LAB003 (Breakout Room LAB006 for networking & refreshments).
 
+
The conference will be held in the Lord Ashcroft Building, Room LAB107 (Breakout Room LAB006 for networking & refreshments).
+
  
 
Please enter through the Helmore Building and ask at reception.
 
Please enter through the Helmore Building and ask at reception.
 +
 +
----
 +
 +
'''Meeting Location'''
  
 
Anglia Ruskin University
 
Anglia Ruskin University
 +
 
Cambridge Campus
 
Cambridge Campus
 +
 
East Road
 
East Road
 +
 
Cambridge
 
Cambridge
 +
 
CB1 1PT
 
CB1 1PT
  
Line 58: Line 63:
  
 
http://www.anglia.ac.uk/ruskin/en/home/your_university/anglia_ruskin_campuses/cambridge_campus/find_cambridge.html
 
http://www.anglia.ac.uk/ruskin/en/home/your_university/anglia_ruskin_campuses/cambridge_campus/find_cambridge.html
 
 
'''Meeting Location'''
 
  
 
Everyone is welcome to join us at our chapter meetings.
 
Everyone is welcome to join us at our chapter meetings.
  
<!-- second tab -->
+
----
= Talks & Abstract =
+
'''Planned dates for upcoming events'''
==='''Next talks'''===
+
  
{|class="wikitable" border="1" |
+
10 February 2015
|- valign="top" align="left"
+
! width="150" | Name Speaker
+
| Paul Cain
+
|- valign="top" align="left"
+
! Bio
+
| Over 12 years experience working in the field of computer forensics.
+
Cutting the bytes within law enforcement more recently within a commercial environment. Conducting investigations on digital devices, providing witness evidence in court and author / teacher of the 7Safe forensic courses.
+
|- valign="top" align="left"
+
! Title
+
| Tracking Data using Forensics
+
|- valign="top" align="left"
+
! Abstract
+
| IP data theft is becoming more common. Many data compromises are exploited from the internal threat. Using case studies this presentation will demonstrate forensic artefacts to provide some answers to how and what data was taken.
+
|-
+
|
+
|- valign="top"  align="left"
+
! Name Speaker
+
| James Forshaw
+
|- valign="top" align="left"
+
! Bio
+
| James is the Head of Vulnerability Research at Context Information Security in the UK. He has been involved with computer hardware and software security for over 10 years with a skill set which covers the bread and butter of the security industry such as application testing, through to more bespoke product assessment, vulnerability analysis and exploitation. He has numerous public vulnerabilities disclosures in many different products including web browser issues and virtual machine breakouts as well as being a Pwn2Own and Microsoft Mitigation Bypass bounty winner.
+
 
+
He has spoken at a number of security conferences in the past, on a range of different topics such including managed language security at Blackhat USA, CanSecWest and Bluehat, Sony Playstation Portable hacking at Chaos Computer Congress, WebGL exploitation at Ruxcon and Citrix network exploitation at Blackhat Europe. He is also the developer of the free CANAPE networking analysis and exploitation tool.
+
|- valign="top" align="left"
+
! Title
+
| The Forger's Art: Exploiting XML Digital Signature Implementations
+
|- valign="top" align="left"
+
! Abstract
+
| Many security critical systems rely on the correct implementation of the XML Digital Signature standard for the purposes of verification and identity management. Technologies such as SAML and Web Service Security use the standard, and its sibling XML Encryption, to manage the security of these technologies. Being a standard there is, unsurprisingly, no canonical implementation for any platform or language, with so many different developments there are likely to be differences in how the standard is interpreted.
+
 
+
While a fair amount research has been done into the effects of the standard such as it allowing signature wrapping attacks, these tend to be exposed due to poor usages of the XML Digital Signature libraries. Comparatively little research has been undertaken in the implementations themselves, how they diverge from the standard, how they ensure security and whether there are any vulnerabilities in the implementations themselves.
+
  
This presentation is about research done against the main open and closed source implementations of XML Digital Signatures, how they can be exploited to gain remote code execution, signature verification bypass or denial of service. It will show some of the more nasty vulnerabilities found during the research including a novel attack against the built-in Java and .NET libraries which allow for trivial signature spoofing exposing any user of those implementations into accepting an invalid signature which is independent of their usage.
+
17 March 2015
|}
+
  
 +
21 April 2015
  
 
<!-- second tab -->
 
<!-- second tab -->
 +
 
= Past Events =
 
= Past Events =
 
{|class="wikitable" border="1" style="text-align:center;"|
 
{|class="wikitable" border="1" style="text-align:center;"|
Line 111: Line 82:
 
! width="350" | Name / Title
 
! width="350" | Name / Title
 
! width="300" | Link
 
! width="300" | Link
 +
|-
 +
|  2 December 2014
 +
| Colin Watson / OWASP Cornucopia
 +
|
 +
|-
 +
| 21 October 2014
 +
| Eireann Leverett
 +
| [[Media:20141021-Eireann_Leverett-SwitchesGetStitches.pdf|presentation]]
 +
|-
 +
| 1st April 2014
 +
| Ian Glover (CREST) / Overview of the CREST activities to professionalise the industry.
 +
|
 +
|-
 +
|
 +
|  Yiannis Chrysanthou (KPMG) / Modern Password Cracking
 +
|
 +
|-
 +
|
 +
| Damien King (KPMG) / Filename Enumeration with TildeTool
 +
|
 +
|-
 +
| 12th November 2013
 +
| Paul Cain / Tracking Data using Forensics
 +
|
 +
|-
 +
| 12th November 2013
 +
| James Forshaw/ The Forger's Art: Exploiting XML Digital Signature Implementations
 +
| [[Media:20131112-James_Forshaw-the_forgers_art-james_forshaw-breakpoint2k13.pdf|presentation]]
 
|-  
 
|-  
 
| 5th March 2013
 
| 5th March 2013
Line 119: Line 118:
 
| Nikhil Sreekumar / Power On, Powershell
 
| Nikhil Sreekumar / Power On, Powershell
 
| [http://www.slideshare.net/Roo7break/power-on-powershell presentation]
 
| [http://www.slideshare.net/Roo7break/power-on-powershell presentation]
 +
|
 
|}
 
|}
  

Latest revision as of 10:47, 1 February 2015

OWASP Cambridge

Welcome to the Cambridge chapter homepage. The chapter leaders are Adrian Winckles and Steven van der Baan.
Click here to join the local chapter mailing list.

Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is and open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter.

Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG

funds to OWASP earmarked for Cambridge.

[edit]

Local News

Cambridge OWASP Chapter Meeting

Tuesday 10th February 2015 17:30 – 20:30, Lord Ashcroft Building (LAB003), Anglia Ruskin University, Cambridge. Hosted by the Department of Computing & Technology, Anglia Ruskin University, OWASP (Open Web Application Security Project) Cambridge Chapter

Guest speakers: Steven van der Baan

Steven is a passionate Security Consultant and Software Architect, with a broad history in software development and architecture. He is currently a Principle Security Consultant with 7Safe/PA Consulting. Steven has a varied background in developing complex systems, mainly in Java. He has the capability to analyse problems and provide sound advice on possible solutions. He can also design a solution that fits the wishes of the client.

In his daily work, Steven is responsible for education in application security matters, advice and implementation of application security measures, performing code and design review and executing web-application security assessments. Steven started as a Core Java developer, grew into the role of Software architect and then made the transfer to application security. Steven has the ISC2, OSCP (Offensive Security Certified Professional) and Java certifications.

Steven is currenty Project manager of the OWASP Capture the Flag (CTF) project.

Title : Web Application Security Testing with Burp Suite

Ever wondered how tools like Burp Suite are used by penetration testers and software security testers to evaluate the robustness of enterprise web applications?

Steven van der Baan will be running a workshop on how to use Burp Suite to find vulnerabilities in a variety of web application scenarios. Using “Capture the Flag” scenario’s which have been successfully deployed at both OWASP AppSec and other information security conferences and guidance from the speaker, you will have the opportunity to experience the tools first hand.

Bring along your laptop (and a wireless card) with Burp Suite installed (potentially this could be part of Kali Live CD, USB or running as a VM)----

Agenda

17:30 – 17:45 Welcome from the OWASP Cambridge Chapter Leader, Adrian Winckles, Course Leader in Information Security & Forensic Computing, Anglia Ruskin University

17:45 – 19:15 Web Application Security Testing with Burp Suite – Steven van der Baan

19:15 – 19:30 Q & A – Further meetings and ideas.

19:45 – 20:30 Refreshments & Networking (coffee, tea, juice) in LAB006


Registration:

To register for this free event, please register online here

The conference will be held in the Lord Ashcroft Building, Room LAB003 (Breakout Room LAB006 for networking & refreshments).

Please enter through the Helmore Building and ask at reception.


Meeting Location

Anglia Ruskin University

Cambridge Campus

East Road

Cambridge

CB1 1PT

Get further information on travelling to the university.

http://www.anglia.ac.uk/ruskin/en/home/your_university/anglia_ruskin_campuses/cambridge_campus/find_cambridge.html

Everyone is welcome to join us at our chapter meetings.


Planned dates for upcoming events

10 February 2015

17 March 2015

21 April 2015


Date Name / Title Link
2 December 2014 Colin Watson / OWASP Cornucopia
21 October 2014 Eireann Leverett presentation
1st April 2014 Ian Glover (CREST) / Overview of the CREST activities to professionalise the industry.
Yiannis Chrysanthou (KPMG) / Modern Password Cracking
Damien King (KPMG) / Filename Enumeration with TildeTool
12th November 2013 Paul Cain / Tracking Data using Forensics
12th November 2013 James Forshaw/ The Forger's Art: Exploiting XML Digital Signature Implementations presentation
5th March 2013 Sarantis Makoudis / Android (in)Security presentation
5th March 2013 Nikhil Sreekumar / Power On, Powershell presentation