[OWASP-Bangalore] Announcing null OWASP Garage4hackers SecurityXploded Bangalore January meet-up on Saturday 18th January 2013
akashmahajan at gmail.com
Sun Jan 5 06:21:45 UTC 2014
The schedule for this month's meet is as outlined below:
09:30 - 10:10: Web Application Security for Beginners: DOM Based XSS -
This is a multipart series on Web Application Security. This session will
cover part 2 of the DOM based XSS subsection, the identification and
concepts behind it. The session will also cover filter bypasses and
different XSS payloads in that context.
10:10 - 10:20: Introductions
10:20 - 10:50: Automated Source code review using Fortify - Rupam
This talk+demo will cover the automated source code review tool called
Fortify . The demo will show on how to configure Fortify, select rules
based on pre-determined conditions and scan the code for different
10:50 - 11:20: Struts Validation Framework: Part 2 - Satish
This session is the second part of the talk on Validation frameworks. These
frameworks are used to secure information from entering business model in
an MVC architecture. “Struts Validation framework” is a set of predefined
plugin codes which have proven best practices in Data validation. We will
take a look at the working of the framework and understand how malicious
data is treated.
11:20 - 11:40: Networking and Break
11:40 - 12:20: Security Onion - Nishanth Kumar
"Security Onion" is an full Linux distribution with packet capture,
network-based and host-based intrusion detection intrusion detection
systems (NIDS and HIDS, respectively) and other powerful analysis tools.
The talk will cover the following aspects of this OS:
1. Introduction of Security Onion
2. Tools included in the OS and usage of these tools for exploitation.
3. How to do Analysis of Packets using tools
12:20 - 12:50: Web Application Security: The pitfalls and the brickwalls, a
developer perspective - Vamsi Krishna
This is a multi-part series on common developer mistakes that result in
major security vulnerabilities. This month we will see how unsanitized data
causes SQL injection due to poor programming practices. We will also take a
look at Insecure Direct Object references where a developer does not
anticipate a permission model for objects resulting in unauthorized access
12:50 - 13:10: Feedback and Topic discussion for next month meet
ThoughtWorks, Ground Floor, ACR Mansion,
147/f, 8th Main Road, 3rd Block, Koramangala,
Bangalore - 560034
Google Maps: http://goo.gl/bokSL
Landmark : Next to Satya's Bar and Mercure Hotel
+ If you are coming from From Inner Ring road get on to Ooty
Chocolates road and after a small crossroad this will be on the right
+ If you are coming from the Raheja Residency road then take a left
turn at the small crossroad and this will be on your right hand side.
+ If you are coming from Koramanagala BDA complex take a right turn at
the small crossroad and this will be on your right hand side.
*That Web Application Security Guy* | +91 99 805 271 82
akashm.com | *@makash* on twitter | linkd.in/webappsecguy
*OWASP Bangalore Chapter Lead | null Community Manager*
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the OWASP-Bangalore