Difference between revisions of "Pen Testing with Iron"

From OWASP
Jump to: navigation, search
(Created page with '== The presentation == rightBy taking advantage of the new Dynamic Language Runtime (DLR) from Microsoft, many challenges in pen testing .NET ba…')
 
(added link header)
Line 1: Line 1:
 +
[[Image:468x60-banner-2010.gif|link=http://www.owasp.org/index.php?title=OWASP_AppSec_DC_2010]]
 +
 +
[https://guest.cvent.com/EVENTS/Register/IdentityConfirmation.aspx?e=d52c6f5f-d568-4e16-b8e0-b5e2bf87ab3a Registration] | [https://resweb.passkey.com/Resweb.do?mode=welcome_gi_new&groupID=2766908 Hotel] | [http://www.dcconvention.com/ Walter E. Washington Convention Center]
 +
<br>
 
== The presentation  ==
 
== The presentation  ==
  

Revision as of 23:00, 20 September 2010

468x60-banner-2010.gif

Registration | Hotel | Walter E. Washington Convention Center

The presentation

Owasp logo normal.jpg
By taking advantage of the new Dynamic Language Runtime (DLR) from Microsoft, many challenges in pen testing .NET based applications are greatly simplified. The combination of dynamic and static languages drives toward a best of breed approach in testing .NET applications.

This talk will focus on practical methods of testing WCF services, Silverlight, and connected WPF Desktop applications using Python or Ruby via the Microsoft Iron* language ports. Specific topics covered will include increasing code visibility, simplified service proxy calls and overriding application behavior dynamically.

Additionally, since the DLR has nearly full support for running python and ruby applications, many familiar pen testing tools can be brought into an engagement to further enhance the testing of .NET applications.

The speaker

Speaker bio will be posted shortly.