Loading…
Hack talk [clear filter]
Thursday, May 21
 

09:50 CEST

The Top 10 Web Hacks of 2014
Every year the security community produces a stunning number of new Web hacking techniques. Now in its 9th year, the Top 10 Web Hacking Techniques list encourages information and knowledge sharing and recognizes researchers who contribute excellent work. In this talk, we will do a technical deep dive and take you through the Top 10 Web Hacks of 2014, as picked by an expert panel of judges. - See more at: https://www.rsaconference.com/events/us15/agenda/sessions/1641/top-10-web-hacking-techniques-of-2014#sthash.nMmmvHCg.dpuf

Speakers
avatar for Matt Johansen

Matt Johansen

Senior Manager, WhiteHat Security
Matt Johansen is a Sr. Manager for the Threat Research Center at WhiteHat Security where he manages a team of Application Security Specialists, Engineers and Supervisors to prevent website security attacks and protect companies’ and their customers’ data. Before this he was an Application Security Engineer where he oversaw and assessed more than 35,000 web... Read More →
avatar for Jonathan Kuskos

Jonathan Kuskos

Senior Application Security Engineer, WhiteHat Security
@JohnathanKuskos is a Manager for WhiteHat Security where he is charged with the expansion of their Belfast, Northern Ireland Threat Research Center. After personally hacking hundreds of web applications over several years he moved into a managerial role so that he could contribute... Read More →


Thursday May 21, 2015 09:50 - 10:35 CEST
Room E106 & E107 Amsterdam RAI

11:05 CEST

OWASP ZAP: More Advanced Features
The Zed Attack Proxy (ZAP) is an OWASP Flagship project and the largest open source web application security tool measured by active contributors.
While it is an ideal tool for people new to appsec it also has many features specifically intended for advanced penetration testing.
In this talk Simon will give a quick introduction to ZAP and then talk about some of the latest changes that have been made, including features that will not have been presented at any other conference.

Speakers
avatar for Simon Bennetts

Simon Bennetts

ZAP Project Lead, Jit
Simon Bennetts is the OWASP Zed Attack Proxy (ZAP) Founder and Project Leader, and a Distinguished Engineer at Jit.He has talked about and demonstrated ZAP at conferences all over the world, including Blackhat, JavaOne, FOSDEM and OWASP AppSec EU, USA & AsiaPac.Prior to making the... Read More →


Thursday May 21, 2015 11:05 - 11:50 CEST
Room Forum Amsterdam RAI

11:55 CEST

Rise Of The Machines - How Automated Processes Overtook the Web
While we all surf the web, read news, buy products or download songs an entire world of automated minions are performing the dirty work for their human masters. These bots perform actions anywhere on the spectrum between legal and illegal. While some bots legally mine data from public web sites, others harass web sites by sending HTTP requests for different purposes such as content theft, comment spam, scan of vulnerabilities or even attempt to deny service from other users. Whether we like it or not - web bots of all kinds and forms are swarming the Internet.
 
In this presentation, we will provide an overview into the web bot world as it is seen by Akamai’s intelligent platform, which handles almost 30% of all web traffic every day.  The presentation will cover the following topics:
History of web bots
Web bot types & their purposes
Legal & illegal bot activity (w/ real world examples)
Mitigation approaches to web bots

Speakers
avatar for Yossi Daya

Yossi Daya

Senior Security Researcher, Akamai Technologies
Yossi Daya, Senior Security Researcher Yossi serves as a Senior researcher for Akamai's Cloud Security business unit. Yossi has over 13 years of experience in the cyber intelligence field with expertise in web data mining, information retrieval & software development.


Thursday May 21, 2015 11:55 - 12:40 CEST
Room Forum Amsterdam RAI

14:30 CEST

The API Assessment Primer
API's are everywhere now. SOA, IoT, Mobile, and Thick clients all heavily rely on web services and API's. This talk will present a primer on how to assess these services/interfaces for developers and testers alike. The introduction will include topics such as API identification, common implementations and frameworks. The bulk of the talk will focus on a assessment checklist that anyone can use to test these technologies for security flaws covering topics such as:

Authentication
Verbose-ness
Hidden Functions
Lack of Access Control
Transport Security
Tampering/Trust
Injection

** Where possible we will point to free resources for assessors to carry out the testing ** 

Speakers
avatar for Greg Patton

Greg Patton

Static Analysis Team Manager, HP Fortify on Demand
Greg Patton is the Static Application Security Testing (SAST) Team Manager with HP Fortify on Demand based in Houston, TX. Greg specializes in application security with a focus on dynamic run-time web and mobile assessments over the past eight years. Greg started his career in software... Read More →


Thursday May 21, 2015 14:30 - 15:15 CEST
Room Forum Amsterdam RAI

15:45 CEST

Abusing JSONP With Rosetta Flash
Discussions about how to protect personal data are lively, but still there was no specific and independent description of privacy risks for web applications available. Thus, companies lack guidance to apply during systems development and users cannot easily check whether they take privacy risks. Therefore the OWASP Top 10 Privacy Risks project was founded 2014 to develop a top 10 list for privacy risks in web applications. The project covers technological and organizational aspects like missing encryption or insufficient transparency and results and practical countermeasures are presented in this session.

Speakers
avatar for Michele Spagnuolo

Michele Spagnuolo

Senior Information Security Engineer, Google
Senior Information Security Engineer at Google Switzerland, Michele is a security researcher focused on web application security, and the Rosetta Flash guy. He is also author of BitIodine, a tool for extracting intelligence from the Bitcoin network.


Thursday May 21, 2015 15:45 - 16:30 CEST
Room Forum Amsterdam RAI
 
Friday, May 22
 

09:50 CEST

E-Banking Transaction Authorization - Common Vulnerabilities, Security Verification And Best Practices For Implementation
E-banking transaction authorization – possible vulnerabilities, security verification and best practices for implementation
Most of  the modern internet or mobile banking applications use some sort of second factor, such as TAN lists, SMS codes, time-based OTP tokens, etc. to let user verify  banking operations and to protect against MitM or malware attacks. During security tests in pre-production, it often turns out that tested banking systems have serious security flaws regarding implementation of transaction authorizations mechanisms,  that (if not detected and corrected) could allow attacker to bypass or weaken those safeguards. During this presentation I would like to throw light on transaction authorization mechanisms security. The agenda will include:
• Examples of possible vulnerabilities, which could allow to bypass those security mechanisms.
• Resistance of selected transaction authorization mechanisms to common banking malware attacks.
• Suggested best practices regarding implementation of transaction authorization.

Speakers
avatar for Wojtek Dworakowski

Wojtek Dworakowski

SecuRing
IT security consultant with over 15 years of experience in the field. Managing Partner at SecuRing, a company dealing with application security testing and advisory on IT security. Has led multiple security assessments and penetration tests especially for financial services, payment... Read More →


Friday May 22, 2015 09:50 - 10:35 CEST
Room Forum Amsterdam RAI

11:05 CEST

WebRTC, Or How Secure Is P2P Browser Communication?
In this presentation, we will provide the necessary insights in this emerging Web technology, and discuss the various security aspects of WebRTC. This content is based on a recent study of the Web Security specifications we have been conducting together with researchers at W3C and Trinity College Dublin in the context of the European FP7 research project STREWS.
Firstly, the overall WebRTC architecture will be presented, and the enabling technologies (such as STUN, TURN, ICE and DTLS-SRTP) will be introduced. This architecture will be illustrated in multiple deployment scenarios. As part of this description, the basic security characteristics of WebRTC will be identified.
Secondly, we will discuss how the new WebRTC technology impacts the security model of the current Web. We will highlight some of the weaknesses they have spot during their security assessment, as well as discuss the open security challenges with the WebRTC technology.

Speakers
avatar for Martin Johns

Martin Johns

Research Expert, SAP SE
Dr. Martin Johns is a Research Expert in the Product Security Research unit within SAP SE, where he leads the Web application security team. Furthermore, he serves on the board of the German OWASP chapter. Before joining SAP, Martin studied Mathematics and Computer Science at the... Read More →
avatar for Lieven Desmet (KU Leuven)

Lieven Desmet (KU Leuven)

Senior Research Manager, KU Leuven
Lieven Desmet is a Senior Research Manager on Software Secure at the imec-DistriNet Research Group (KU Leuven, Belgium), where he coaches researchers in (web) application security and participates in dissemination and valorization activities. His interests are in security of middleware... Read More →


Friday May 22, 2015 11:05 - 11:50 CEST
Room E106 & E107 Amsterdam RAI

11:55 CEST

So, You Want To Use A WebView?
The (Android) WebView is an embeddable component that powers the majority of internet-enabled apps. In Android, WebViews are currently a hot topic but for all the wrong reasons. WebViews make connections, render HTML and run JavaScript and so can be attacked using traditional web attacks like connection hijacking and XSS. Secondly, WebView-enabled apps combine local resources with web-based content that are rendered in the same container. This makes a Same Origin Policy bypass far more dangerous: it can mean access to the local device file-system and juicy local user data that you thought was sandboxed. Malicious code can even target other applications remotely by using the WebView as a proxy. Finally WebViews create residual risks that simply cannot be mitigated through any in-app technical control. This talk is aimed at both testers and developers. They learn some fundamental WebView mistakes, how to attack them, how to fix them and which vulnerabilities simply must be accepted in this design.

Speakers
avatar for Andrew Lee-Thorp

Andrew Lee-Thorp

Senior Consultant, Cigital
Andrew Lee-Thorp is a security consultant with over 10 years of experience cutting his teeth in development from smart cards through to high-end servers systems. He currently works as a Consultant with Synopsys where he performs code reviews, architectural risk analysis, and Android... Read More →


Friday May 22, 2015 11:55 - 12:40 CEST
Room E102 Amsterdam RAI

14:30 CEST

Mobile Application Assessments By The Numbers: A Whole-istic View
By analyzing the data from over 100 mobile application security assessments, we identify the typical types of mobile vulnerabilities, the system components that contain those vulnerabilities, the components where given types of vulnerabilities cluster, and how to test for each of these. Attendees will learn in the session how to identify these vulnerabilities, how to create and implement an effective mobile security plan, and where to focus their limited testing resources to minimize mobile application portfolio risks. This is critical because automated web application testing tools are able to easily find vulnerabilities while today’s mobile security industry does not offer automated testing tools that can effectively test web services (i.e. the interaction between mobile clients and back-end services.) As a result, best practices for mobile application testing must incorporate significant, often laborious, manual testing. At this point in the presentation, we will use the statistics from the research to define the appropriate manual testing that needs to be implemented. 

Speakers
avatar for Dan Cornell

Dan Cornell

Vice President, Product Strategy, COALFIRE
A globally recognized software security expert, Dan Cornell has over 20 years of experience architecting, developing and securing software systems. As Vice President of Product Strategy at Coalfire, Dan works with customers and industry partners to help drive the direction of their... Read More →


Friday May 22, 2015 14:30 - 15:15 CEST
Room E102 Amsterdam RAI

15:45 CEST

PDF - Mess With The Web
In this presentation Alex Inführ talks about possible attack vectors against web pages by using PDFs.
First the structure of a simple PDF will be presented to give
a quick overview about the concept of PDF. Additionally interesting features in the PDF specification will be discussed.
This includes information about privileged JavaScript,FormCalc, XFA, Actions and more.
Adobe Reader also has some interesting security concepts, which mostly focus on protecting the end user on a system level.

In the second part Alex Inführ will cover possible attacks against the user. This includes web related issues as well as attacks against the end user system.
The attacks show how privileged JavaScript can be used to steal local files from the user. Additionally possible XXE issues will be covered.
Another big topic is FormCalc and the possibility to read any file same origin. This gives attackers the possibility to break CSRF protection completely.

Last but not least Alex Inführ will talk about what protection could be applied.
This will cover methods for end users as well as for website owners. 

Speakers
avatar for Alex Inführ

Alex Inführ

Alexander Inführ is a master student from Austria. He is studying information security at the University of applied science in St. Pölten, Austria. Beside being a student Alex works for the pentesting firm cure53 as a pentester. He is especially interested in web related... Read More →


Friday May 22, 2015 15:45 - 16:30 CEST
Room E102 Amsterdam RAI
 
Filter sessions
Apply filters to sessions.