Jump to content
em

Mini conferinta OWASP regionala

Recommended Posts

The OWASP community includes corporations, educational organizations, and individuals from around the world. This community works to create freely-available articles, methodologies, documentation, tools, and technologies.

Maine, 5 iunie, Bucuresti, Politehnica.

Inregistrare aici

Program.

02:30 pm

(30 mins) Introduction & Welcome Ionel Chirita, Claudiu Constantinescu Introduction to OWASP

03:15 pm

(45 mins) Penetration Testing - a way for improving our cyber security Adrian Furtun? The talk presents a comparison between two internal penetration tests made in consecutive years at the same client. We will see the successful attack scenarios and the techniques used to take control over the network. Furthermore, we will see how and why the security posture of the client improved as a result of the penetration tests.

04:15 pm

(45 mins) Android reverse engineering: understanding third-party applications Vicente Aguilera It will present the objectives of the software reverse engineering and the techniques and tools to execute this process in Android applications. It will present, from a security analyst point of view and in a practical manner, the process of analyzing an existing application at Google Play Store.

05:15 pm

(45 mins) The Trouble with Passwords Mark Goodwin Many developers still seem unsure of how to deal with passwords and password data. This presentation covers some common mistakes made when storing credentials and introduces some good ways of tackling them.

06:15 pm

(45 mins) Hacking the ViewState in ASP.NET Ovidiu Diaconescu The view state is a necessary evil of ASP.NET Web Forms. Without having the proper protection mechanisms in place, it is trivial to exploit. This session will teach you how to take advantage of unsecured web applications and how to tighten-up your own

07:15 pm

(45 mins) Do you "GRANT ALL PRIVILEGES ..." in MySQL/MariaDB/Percona Server? Gabriel Preda We discuss (at least) elementary security procedures for MySQL and it's forks. Dive through short information about MySQL forks, replication options and their security implications. Finally some notes on what changes about security when you scale MySQL.

Edited by em
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...