Difference between revisions of "OWASP EEE Bucharest Event 2015 Agenda"

From OWASP
Jump to: navigation, search
Line 2: Line 2:
  
 
{|style="vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;" align="center" cellspacing="4"
 
{|style="vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;" align="center" cellspacing="4"
| style="width:100%" valign="middle" height="40" bgcolor="#CCCCEE" align="center" colspan="6" | <h2>Agenda </h2>
+
| style="width:100%" valign="middle" height="40" bgcolor="#CCCCEE" align="center" colspan="6" | <h2>Conference agenda </h2>
 
|-
 
|-
 
| style="width:10%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" |  '''Time'''  
 
| style="width:10%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" |  '''Time'''  
Line 57: Line 57:
 
|-
 
|-
 
|}
 
|}
 +
 +
9.00 - 14.00 - [http://www.ccins.ro/sala-albastra.php Sala Albastra ]<br>
 +
'''Workshop name:'''<br>
 +
'''OWASP Top 10 vulnerabilities – from discovery to complete exploitation'''<br>
 +
'''Description:'''<br>
 +
The purpose of this workshop is to increase the participants’ awareness on the most common web application vulnerabilities and their associated risks. <br>
 +
We will discuss each type of vulnerability described in the OWASP Top 10 project and we will be practicing manual discovery and exploitation techniques. <br>
 +
This will be a (very) hands-on workshop where we will practice exercises as:<br>
 +
- Discover SQL injection and exploit it to extract information from the database<br>
 +
- Find OS command injection and exploit it to execute arbitrary commands on the target server<br>
 +
- Discover Cross-Site Scripting and exploit it to gain access to another user’s web session<br>
 +
- Identify Local File Inclusion and exploit it to gain remote command execution<br>
 +
- Find Cross-Site Request Forgery and exploit it to gain access to the admin panel<br>
 +
- Other fun and challenging tasks<br>
 +
Of course, we will also present safe ways in which the identified vulnerabilities can be eliminated or mitigated in a production environment.<br>
 +
Intended audience: Web application developers, security testers, quality assurance personnel, people passionate about web security<br>
 +
'''Skill level''': Intermediate<br>
 +
Requirements: - Laptop with a working operating system <br>
 +
- At least 2 GB of free disk space and at least 2 GB RAM<br>
 +
- Administrative rights on the laptop<br>
 +
- VMWare Player installed<br>
 +
'''Instructors: '''Adrian Furtună – Technical Manager – Security Services – KPMG Romania<br>
 +
-Ionuţ Ambrosie– Security Consultant – KPMG Romania<br>
 +
'''Workshop duration: '''5 hours<br>
 +
'''Seats available: '''20 (first-come, first served)<br>
 +
'''Price '''100 euros; Student ticket is 25 euros (within the limit of 10 places)<br>
 +
 
<!--
 
<!--
 
{{:OWASP_EEE_Bucharest_Event_2015_Sponsors}}
 
{{:OWASP_EEE_Bucharest_Event_2015_Sponsors}}
 
-->
 
-->

Revision as of 13:31, 3 September 2015


Conference agenda

Time Title Speaker Description
10:00 - 10:30
(30 mins)
Registration
10:30 - 10:45
(15 mins)
Introduction & Welcome Oana Cornea Introduction to OWASP & Bucharest Event, Schedule for the Day
10:45 - 11:30
(45 mins)


11:50 - 12:35
(45 mins)
12:55 - 13:40
(45 mins)
13:40 - 14:30
(50 mins)
Lunch/Coffee Break
14:30 - 15:15
(45 mins)
15:20 - 16:05
(45 mins)
16:10 - 16:55
(45 mins)

9.00 - 14.00 - Sala Albastra
Workshop name:
OWASP Top 10 vulnerabilities – from discovery to complete exploitation
Description:
The purpose of this workshop is to increase the participants’ awareness on the most common web application vulnerabilities and their associated risks.
We will discuss each type of vulnerability described in the OWASP Top 10 project and we will be practicing manual discovery and exploitation techniques.
This will be a (very) hands-on workshop where we will practice exercises as:
- Discover SQL injection and exploit it to extract information from the database
- Find OS command injection and exploit it to execute arbitrary commands on the target server
- Discover Cross-Site Scripting and exploit it to gain access to another user’s web session
- Identify Local File Inclusion and exploit it to gain remote command execution
- Find Cross-Site Request Forgery and exploit it to gain access to the admin panel
- Other fun and challenging tasks
Of course, we will also present safe ways in which the identified vulnerabilities can be eliminated or mitigated in a production environment.
Intended audience: Web application developers, security testers, quality assurance personnel, people passionate about web security
Skill level: Intermediate
Requirements: - Laptop with a working operating system
- At least 2 GB of free disk space and at least 2 GB RAM
- Administrative rights on the laptop
- VMWare Player installed
Instructors: Adrian Furtună – Technical Manager – Security Services – KPMG Romania
-Ionuţ Ambrosie– Security Consultant – KPMG Romania
Workshop duration: 5 hours
Seats available: 20 (first-come, first served)
Price 100 euros; Student ticket is 25 euros (within the limit of 10 places)