OWASP Israel January 2014

From OWASP
Revision as of 09:56, 19 December 2013 by Avi Douglen (Talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

The next meeting for the Israel chapter of OWASP will take place on January 14th, starting from 17:00.

The meeting will be held at the Amdocs Auditorium, Hapnina 8, Raanana.

The building is called the Kenyon (it's the one on the right, where MS and other companies are sitting). In the Kenyon, the conference room is called the Auditorium. Parking is available in the visitor's parking lot.

Please note that the Amdocs security personnel require a full list of names of everyone who will be coming, this may be checked on entrance. (Only your first and last names are required).


Please make sure to RSVP here:

https://www.eventbrite.com/e/owasp-israel-chapter-meeting-jan14-tickets-9892286094


The meeting’s agenda will be:

17:00 – 17:30 Gathering, pizza, and drinks


17:30 – 17:45 Opening note


17:45 – 18:30 PHP SuperGlobals: Supersized Trouble - Shelly Hershkovitz, Imperva

Used in over 80% of all websites, PHP is the most popular Web application development platform in the world. The widespread use of PHP, however, makes it an attractive target for malicious hackers. By focusing attacks on vulnerabilities found in popular third party components, such as PHP, hackers are able to expand their reach to many unsuspecting websites.

In this talk we look at in-the-wild modification and exploitation of PHP SuperGlobal variables. This is a special case of a more general weakness called “External Variable Modification”. This weakness was assigned a specific Common Weakness Enumeration (CWE) code, CWE-473 by MITRE, with the following description: “A PHP application does not properly protect against the modification of variables from external sources, such as query parameters or cookies”.

We detail the in the wild exploitation of SuperGlobal variables issues for the purpose of remote code execution, remote file inclusion, and security filter evasions attacks. A special focus is given to the analysis of a specific exploit that combines together different vulnerabilities in order to achieve remote code execution. The analysis includes a deep dive into the technical details of each of the vulnerabilities, analysis of the exploit itself and its use in the wild.

Finally, we suggest several practical steps that allow security officers to defend their websites against such attacks.


18:30 – 19:15 NTLM Based Authentication in Web Applications: The Good, The Bad, and the NEW Ugly - Oren Ofer, EY

The crusade against NTLM started (without me) over 16 years ago.

Nevertheless, NTLM proved as a cunning opponent; It mutated, improved, got stronger, survived, and still refuses to go away. “If there is no struggle there is no progress” (F. Douglas).

The lecture will begin with a live demonstration which will reveal a new design flaw in NTLM along with a dedicated tool that enables attackers to fully impersonate any web application user.

The lecture will cover the mechanics of the new attack vector and will inspect its relevancy to OWASP’s Top 10 categories and its deadliest attacks.


19:15 – 19:30 Coffee break


19:30 – 20:15 Master of droids: Latest adventures in Android security bugs - Elad Shapira, AVG

This presentation will enable a rare glimpse into the technical details of recent Android security bugs and in particular the 'master key' vulnerability.

We will discuss and show what a malicious attacker is able to do with those bugs all in a wild and fun atmosphere but with a serious, in-depth and “out-of-the-box” perspective.