[Owasp-cork] OWASP Top 10 Workshop - 28 May 2015

Darren Fitzpatrick darren.fitzpatrick at owasp.org
Fri May 15 14:51:01 UTC 2015

Hi all,

Thursday 28 May will see the first of our free series of workshops based on
OWASP's most well known flagship project, the OWASP Top 10 (2013)
https://www.owasp.org/index.php/Top10. The goal of these workshops is to
learn by doing, which is usually the best approach to learning anything. In
that light, we will speak a little about each of the areas from the Top 10,
then take that learning to the next level by attacking vulnerable sites and
investigating vulnerable code and configurations.

To sign up, please visit the Cork Chapter meetup site for this event:

Note: To get the most out of these workshops, it would be best to bring
your own laptop. This should have >1 GB of RAM, >5 GB of free storage and a
reasonably fast processor. Failing these laptop requirements we could
probably work around it, but this would be best for following the standard
approach that will be taken by most.

This month's workshop will be divided into three phases:

1. Setting Up Your Test Environment

To start the night we will define test environments at a high level and
then help you to configure VirtualBox with a hacking / penetration testing
specific virtual machine, namely Kali Linux. Kali will provide a tailored,
pre-configured environment for testing and comes pre-populated with a vast
array of tools for all your hacking needs! If you just bring your laptop,
we will have the files ready for you to install, or if you are a paranoid
security person ;) you can download in advance from here:


https://www.kali.org/downloads/ (32 bit iso)

2. Top 10 2013-A4-Insecure Direct Object References

Insecure direct object reference occurs when a web application allows the
user to choose the target data for their transaction without correctly
restricting to the data to which they should be privy. In a secure
configuration, the target data for retrieval would be based on the
particular user session, however often the data retrieval decisions are
based on parameters which the user can access. E.g. you access your on-line
bank account details, but manipulate the incorrectly implemented request to
have the application think that you are another user, and return that other
user's details.

We will discuss a number of varieties of this issue along with methods for
avoiding it in your application code.


3. Practical Hands On Workshop

This section of the night will invoke our learning from the first two
phases and put it to practical use. We take our new testing environment and
use it to exploit some direct object reference vulnerabilities on a safe,
intentionally vulnerable website.

After giving some time for individually attempting to carry out the
exploitation, a walk-through of the exploit technique will be given for
each of the examples outlined. The OWASP team will be at hand to help with
any issues that might arise through this phase.

Practical elements will cover the following two perspectives so that you
leave with not only an understanding of the issues but also having had
hands on practice in these areas:

1. Defensive - Seeing vulnerable code / configurations and investigating
how the issues could be rectified.

2. Offensive - Attacking vulnerable sites from a malicious attacker or
software tester's perspective.

Hope to see you there!

Darren & Fiona (OWASP Cork Team)
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.owasp.org/pipermail/owasp-cork/attachments/20150515/6a0cdcba/attachment.html>

More information about the Owasp-cork mailing list