[event-announce at guug.de] Meet the folks of ws-attacker, BeEF, WAHH, sqlmap, Zed Attack Proxy, OWASP Top10, DOMinator, Minion, Mallodroid, and the inglorious bastards aka HackPra Allstars

Dirk Wetter dirk.wetter at guug.de
Fr Jul 26 09:52:05 CEST 2013


... at this year's OWASP AppSec Research 2013 (https://appsec.eu/) , which takes place in less than
4 weeks in Hamburg!

Excerpt:

A: Awesome trainings  (https://appsec.eu/trainings/)

Two days of pre‐conference technical training with a focus on builders (PHP, Java, JavaScript), a
bit of breaking and defending and last but not least satisfying the signs of time: Mobile!
Important: Trainers with outstanding international reputation! Highlights:

* Marcus Pinto (WAHH): MDSec’s Web Application Hacker’s Handbook, Live Edition
* Hawaiian Jim Manico, Irishman Eoin Keary: Web Application, Web Service and Mobile Secure Coding
* Dave Wichers (Project Lead OWASP Top 10): Securing Mobile Devices and Applications
* Mobile stuff: Mobile Application Hacking and Security — OWASP Top 10 Way by Hemil Shah
* Big stuff: SAP ABAP Pentesting from Frederik Weidemann
* New Stuff: Tiago Teles Defensive Programming for JavaScript & HTML5
* Solid stuff: Paco Hope (author of "web seurity testing book"): Defensive Programming in PHP
* Solid stuff II: Christian Schneider: Java Web Hacking & Hardening
* Go-away stuff: Christian Bockermann (AuditConsole) teaches ModSecurity in depth


B: Exciting conference program highlights, 2 days, 3 tracks (http://sched.appsec.eu/)

* David Ross (Master mind of the XSS filter in IE8+): insane in the IFRAME
* Yvan Boily (Mozilla): new testing framework Minion
* Stefano Di Paola ("DOMinator"): JavaScript libraries (in)security: A showcase of reckless uses
  and unwitting misuses
* Taras Ivashchenko (Yandex): CSP on a service with an audience more than 11 million users per week
* Chris Eng: Real‐World Agile SDLC, not kidding
* Simon Bennetts (Mozilla/OWASP): Tells what's new in OWASP Zed Attack Proxy
* Jim Manico (WhiteHat/OWASP): Shows new "Top 10 Proactive Controls" for Developers
* Dave Wichers (Aspect/OWASP): 1st presentation of the "OWASP Top 10 – 2013"
* Milton Smith (Product Security Manager for Java platform products @ Oracle) tries to explain how
  to "Make the Future Secure with Java"
* Krzysztof Kotowicz (PRISM .. err .. Amazon 1 Button Chrome Extension):  I'm in ur browser, pwning
  your stuff - Attacking (with) Google Chrome extensions
* Michele Orrų, Sardinian: Rooting your internals: Inter-Protocol Exploitation, custom shellcode
  and BeEF
* Paul Stone: Precision Timing – Attacking browser privacy with SVG and CSS
* Gareth Heyes, Scottish Highlander, will present an array of so far unpublished XSS attack
  techniques in his XSS Horror Show
* Mario Heiderich, believes that XSS can be eradicated by using JavaScript, will cover HTML
  injections that break each and every HTML filter and shows buggy browsers
* Fun with Broken SSL implementations on Android, spotted by MalloDroid (a story which made it to
  WSJ last year)
* ... some more interesting SSL stuff!
* Keynotes by Thomas Roessler (W3C), Angela Sasse (Head Information Security Research @ University
  College London), Dieter Gollmann (Head of Security in Distributed Applications, Technical University
  of Hamburg-Harburg

See teasers @ https://appsec.eu/program/talk-teaser/, https://appsec.eu/program/hackpra-allstars/


C: Open Source Security Showcase (https://appsec.eu/program/open-source-security-showcase/)

* Would you like to inject some SQL? Miroslav Stampar will show you how with sqlmap!
* Chris Bockermann: Honeynetting the web with community collectors running mod_security
* A new kid on the webservices penetration testing block:  WS-Attacker presented by XML-Security
  dudes Juraj Somorovsky and Christian Mainka


and much much more!

The conference will be held from August 22-23, 2013 (trainings from August 20-21) at the Emporio
Hamburg. It's centrally located in the heart of the city with a splendid view over Binnen-,
Aussenalster
and River Elbe.

As ticket prizes are subsidized by sponsors (anybody still interested? http://is.gd/QY8PT2), thus
entry fees
are low (excl. VAT):
* 350 EUR€ (ISACA/ISC2/OWASP member)
* 420 EUR normal prize

trainings come extra.

The Open Web Application Security Project (OWASP) is a global open project composed of individuals,
educational organizations and supporting corporations from around the world. OWASP has quickly become
the defacto standards body for web application and software security by providing free, vendor‐neutral,
practical, cost‐effective application security guidelines.


cu,

Dirk

-- 
German OWASP Board, Conference Chair AppSec EU 2013
http://appsec.eu/       |                 @appseceu
skype://drwetter.de     |      tel:+49-40-2442035-1