Difference between revisions of "Leeds UK"
|Line 79:||Line 79:|
Revision as of 07:25, 4 May 2011
OWASP Leeds UK
Welcome to the Leeds UK chapter homepage. This is a new chapter and we are looking for enthusiatic new members to make this one of the best OWASP chapters. We are hoping to accumalate a good proportion of subject matter experts who will in turn be able to provide guidance and presentations for the benefit of all chapter members. So please join the mailing list and contribute.
Details of your chapter Board members can be found here Leeds_UK_chapter_leaders
OWASP Foundation (Overview Slides) is a professional association of global members and is and open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.
Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member?
2011 Planned Meetings
June 22nd Manchester
September 21st Leeds
December 14th Manchester
Date: Wednesday 23rd March in Leeds::: Please RSVP via the eventbrite link http://www.eventbrite.com/event/1429362261
Location: Brewery Taps, 18 New Station Street, Leeds, LS1 5DL - Map here http://www.brewerytapleeds.co.uk/contact.html
Schedule: 18:00 for 18:20 start
OWASP Chapter introduction. OWASP values and membership. Chapter information.
OWASP Leeds board member
The talk is basically an overview of some research that I have recently been conducting in terms of obfuscation methods. It is my belief that pentesting should be used to simulate real world attacks so that not only application and infrastructure vulnerabilities are being found, but log management and sys admin level problems are found too. The talk isn’t technical – it is more about introducing methods on how this can work – I do talk about a few examples but I do not go into huge technical detail about it. I then go on to talk about a methodology that could work in terms of obfuscation methods – this is something that I think could be incorporated into the OWASP testing guide and I talk about that too.
19:15 - 20:00
The Image that called me - Active Content Injection with SVG Files
Scalable Vector Graphics are about to conquer the web. Unlike most of their raster based companions from the GIF, PNG and JPEG family, their vector based structure allows to display them on many different devices with various screen sizes without losing visual information. The open XML based SVG sources permit addition of meta data, helping even the visually impaired and blind to get the most out of these images. Additional modules, such as animations, events, SVG fonts, several scripting APIs and inclusion of hyper-links, other images and documents and even arbitrary content from cross-domain sources make SVG the perfect image format for the future WWW.
Nevertheless, a powerful standard such as SVG certainly poses a lot of risks. This presentation provides a close look at SVG from a security perspective. How can attackers abuse this mighty image format, which ways exist to execute script code and worse, and what should web developers and browser vendors consider when dealing with SVG. How will HTML5 change the way to work with SVGs and why does it matter for security professionals to know about things like SVG Tiny, in-line SVG, SVGz and other acronyms from a world where imaging and scripting collide? Besides many examples of malicious SVGs the talk will shed light on a novel filtering tool capable of filtering and sanitizing SVG images without loss of important content.