Loading…
Tuesday, October 17
 

08:30 IDT

09:30 IDT

OWT Training Day
Speakers
avatar for Shay Chen

Shay Chen

CEO, Effective Security
Shay Chen is the CEO of Effective Security, an information-security boutique company specializing in information security assessments and in automating security processes of vulnerability management and SDLC. He has over twelve years in information technology and security, a strong... Read More →



Tuesday October 17, 2017 09:30 - 17:30 IDT
Main Auditorium

17:30 IDT

WIA (Women in AppSec)
Mentors
avatar for Irene Abezgauz

Irene Abezgauz

Co-founder, VP Product, Cymmetria
Breaking and building stuff, everything security and almost anything technology.
avatar for Keren Elazari

Keren Elazari

@k3r3n3, BSidesTLV
avatar for Limor Sylvie Kessem

Limor Sylvie Kessem

Sr. Managing Consultant, Cyber Crisis Management, IBM Consulting
Limor Kessem is a Senior Managing Consultant with X-Force’s Cyber Crisis Management, helping organizations prepare for and face crisis-level cyber-attacks. Previously Executive Security Advisor at IBM Security. She is a widely sought-after security expert, speaker and author and... Read More →
HM

Hila Meller

Head of Security Services South Region, dxc Technology
SP

Smadar Paradise

Director cyber security protection, Check Point
avatar for Shira Shamban

Shira Shamban

Dome9 Security

Tuesday October 17, 2017 17:30 - 20:30 IDT
Main Auditorium
 
Wednesday, October 18
 

08:30 IDT

09:30 IDT

Opening Words
Organizers
avatar for Avi Douglen

Avi Douglen

OWASP BoD, Bounce Security
AviD is a high-end, independent security architect and developer, and has been designing, developing and testing secure applications, and leading development teams in building secure products, for around 20 years. My research interests include efficient security engineering, usable... Read More →

Wednesday October 18, 2017 09:30 - 10:00 IDT
Main Auditorium

10:10 IDT

Call the plumber - you have a leak in your (named) pipe
As presented in the last Def Con Las Vegas:
Windows named pipes is a largely unfamiliar interface, or often mistekenly considered as an internal-only communication interface.

In this talk I will present how named pipes vulnerabilities can be exploited for remote denial of service, remote code execution and other dangerous attacks.

Speakers
avatar for Gil Cohen

Gil Cohen

CTO, Comsec
Gil is an experienced application security instructor, architect, consultant and pentester just starting his 12th year in the field. _x000D_ With past experience in the civilian, government and military cyber security industries, Gil currently serves as the CTO of Comsec Group, in... Read More →


Wednesday October 18, 2017 10:10 - 10:55 IDT
Room 10 - CS and Communications Building
  Breaker
  • Technical Level All

10:10 IDT

Authentication Without Authentication
Authentication is important, but how do you authenticate when user interaction is not an option? For example, an IoT app without a user interface. We need to authenticate the app - without any predefined credentials. Want to see how? Join me for this session, including a live demo on Raspberry Pi!

Speakers
avatar for Dirk Wetter

Dirk Wetter

Dirk Wetter (Ph.D.) is an independent security consultant with more than 20 years of professional experience in information security. He has a broad technical and information security management background. He has published over 60 articles in computer magazines.His primary focus... Read More →



Wednesday October 18, 2017 10:10 - 10:55 IDT
Main Auditorium
  Builder

10:15 IDT

CtF Workshop #1 - Breaking Clouds

With over half of the fortune 500 on board, Cloud Foundry is considered to be the world's leading cloud platform. In this session, we will show some very interesting vulnerabilities that we identified and responsibly disclosed over this year to the platform's maintainers. We will discuss issues in working with zip files, using parameters in ruby-rack as well as various cases of time-of-check vs time-of-use and expand on each issue with a barrage of real world examples. 

In the second part of the session we will work out how migrating applications to a cloud environment might open them up to new and exciting vectors that are otherwise considered unexploitable.

We will see how with new technologies come new vulnerabilities and sometimes, it's just the old vulnerabilities that are making a comeback. 

Attendees could perform the learnt attacks on a pre-configured environment during the workshop.


Workshoppers
ES

Eran Shmuely

Sr Staff Cyber Security Researcher, GE Digital
VS

Vladi Sandler

Security Researcher, GE


Wednesday October 18, 2017 10:15 - 11:45 IDT
Room 37 - CS and Communications Building
  Workshop

11:00 IDT

11:05 IDT

IP Protection: How NOT to implement the license protection in .NET systems
IP is most valued property of the company, especially start-up.
There are many ways to implement the license protection in .NET systems.
Most, if not all, ways are wrong and can be easily compromised.
Discussed common methods to protect the license and methods to crack it

Speakers
avatar for Vlad Bukin

Vlad Bukin

Security Research Manager, WAF, SpiderLabs, Trustwave
I am developer from dinosaur era - late 80-x of previous century. From this pre-historic time I am passionate about computers and software. I worked many years in software development area in many dev and lead roles: developer, leading developer, system architect, algorithm developer... Read More →



Wednesday October 18, 2017 11:05 - 11:50 IDT
Room 10 - CS and Communications Building
  Breaker

11:05 IDT

Bleeding Secrets!
We do our best to protect the servers' information using security controls like TLS communication, Firewall and advanced security cloud services, but then they bleed secrets (arbitrary pieces of memory are leaked to a potential attacker).

This talk observes three zero days found within security solutions (two from this year) that can be the cause for data breaches like the one from May 31 where OneLogin was breached and encrypted secrets were stolen in clear text.
We will review code, understand the vulnerabilities, assess the root cause, challenge a few assumptions (on open-source, security solutions and others) and review some best practices that can help prevent such vulnerabilities.


Wednesday October 18, 2017 11:05 - 11:50 IDT
Main Auditorium
  Builder
  • Technical Level All

11:50 IDT

Coffee Break
Wednesday October 18, 2017 11:50 - 12:15 IDT
CS Building and Garden

12:15 IDT

Infusing Security Awareness in Agile Product Management
The goal of our session is to inspire organizations to increase their security conscience, by addressing the security from both process and content points of view.
As part of the Shift Left movement in the world of security,we'd like to suggest a surprising security ambassador: The Product Manager.

Speakers
avatar for Elena Kravchenko

Elena Kravchenko

ADM BU Security Lead, Micro Focus (former HPE Software)
Elena represents the Security side of the project and brings vast experience in both development and security areas. She is responsible for a department developing 12 products ( ~400 developers) HPE Software Security Lead for HPE's Application Delivery Management (ADM) Business... Read More →
avatar for Efrat Wasserman

Efrat Wasserman

Product manager, Intel
Efrat is a Product Manager at Intel. Efrat brings deep knowledge and experience in both software development and project/product management areas. Efrat's former position was a Senior Program Manager at HPE SW, Efrat holds a BSc in Computer Science and Mathematics and an MBA in... Read More →


Wednesday October 18, 2017 12:15 - 13:00 IDT
Main Auditorium
  Builder
  • Technical Level All

12:15 IDT

How to get the best AppSec test of your life
The Internet is full of advice on delivering a better pen test. That's great but what if you are the one arranging or receiving the test? In this talk, I want to use my experience of scoping and delivering these tests to give you, the recipient, ideas on how to get the best value from AppSec tests.

Speakers
avatar for Josh Grossman

Josh Grossman

Chief Technology Officer, Bounce Security
Josh has worked as a consultant in IT Security and Risk for over a decade and also as a Software Developer. He currently works as a Team Leader in Comsec Group's Application Security division where he leads and delivers web and mobile application security tests with the aim of not... Read More →



Wednesday October 18, 2017 12:15 - 13:00 IDT
Room 10 - CS and Communications Building
  Defender

12:15 IDT

CtF Workshop #2 - Exploiting Authentication Issues For 25,000$

Authentication mechanisms are considered to be the most sensitive part of any application and yet they seem to be some of the most prone for implementation errors. In this session, the security researcher will discuss how he broke the authentication mechanisms for some of the biggest applications in the world (Uber, Yahoo, Twitter, etc.). He will present advanced practical ways of exploiting SSO mechanisms such as SAML and OAuth, as well as user invitations and password reset mechanisms. 

In the second part of this session we will examine how CSP(Content Security Policy) helped fixing one of the vulnerabilities and we will elaborate about the various security-related HTTP security headers described by The Internet Engineering Task Force (IETF).

A security researcher from GE Digital will discuss what each one of these headers does to help augment web application security and under what circumstances they could be bypassed by a clever adversary. 

Attendees could perform the learnt attacks on a pre-configured environment during the workshop.


Workshoppers
avatar for Michael Reizelman

Michael Reizelman

Security Researcher, GE Digital


Wednesday October 18, 2017 12:15 - 13:45 IDT
Room 37 - CS and Communications Building
  Workshop

13:10 IDT

Stranger Danger: Addressing Security Risk in Open Source Code

Open source modules, maven and python packages, ruby gems and especially npm, are undoubtedly awesome. However, they also represent an undeniable and massive risk. You’re introducing someone else’s code into your system, often with little or no scrutiny. The wrong package can introduce severe vulnerabilities into your application, exposing your application and your users data.

The security risk from vulnerable open source binaries is well understood. While still often mishandled, there are good practices for tackling it, and industry trends like Serverless & PaaS all but eliminate it.

Vulnerabilities in open source code packages, however, get practically no air time. These packages, pulled from the likes of npm, RubyGems and Maven, are just as prevalent, outdated and hard to manage. More importantly, they’re just as vulnerable!

In this talk I’ll share details and demonstrate several vulnerabilities in popular packages. For each issue, I’ll explain why it happened, show its impact, and – most importantly – see how to avoid or fix it.


Speakers
avatar for Danny Grander

Danny Grander

Security, Snyk
Danny Grander is a veteran security researcher and the cofounder of Snyk.io, where he works on open source security and leads Snyk’s security research. Previously, Danny was the CTO of Gita Technologies and a lead researcher and developer for a few startups. Danny is a frequent... Read More →



Wednesday October 18, 2017 13:10 - 13:35 IDT
Main Auditorium
  Builder

13:10 IDT

The Short History and The Bright Future of Mobile Banking Trojans
Financial Trojans for Mobile have been evolving quickly in recent years, I'll be presenting a few old tricks and a few new tricks these trojans have adopted.

Speakers
avatar for Julia Karpin

Julia Karpin

Sr. Malware Researcher, F5 Networks
Julia Karpin is a reverse engineer at the F5 security research team. She has been dealing with financial malware and their shenanigans since 2012. Her main interest is Windows\Android malware research and automating every research aspect that can be automated.



Wednesday October 18, 2017 13:10 - 13:35 IDT
Room 10 - CS and Communications Building
  Defender

13:40 IDT

Lunch
Wednesday October 18, 2017 13:40 - 14:30 IDT
CS Building and Garden

14:15 IDT

CtF Workshop #3 - Cache me if you can

Hash functions are all around us, being used for a variety of applications such as data integrity verification, de-duplication algorithms and as pointer generators in hash-tables. In this session a security researcher from GE Digital will discuss and demonstrate the differences between cryptographic and none-cryptographic hashes, generating collisions and performing cache poisoning and timing attacks against applications that use hashing naively. 


Attendees could perform the learnt attacks on a pre-configured environment during the workshop.


Workshoppers
avatar for Amit Kaplan

Amit Kaplan

Cyber Security Researcher, GE Digital
BSc in Communication systems engineering from Ben Gurion University of the Negev. Currently work as Cyber Security Resercher. My main fields of interest are Cryptography and Side-Channel Attacks. And Whisky........


Wednesday October 18, 2017 14:15 - 15:15 IDT
Room 37 - CS and Communications Building
  Workshop

14:30 IDT

Bots and Carts
This lecture will go over some examples of automated attacks targeting eCommerce websites and specifically the cart and purchase flow. We will discuss some real (yet anonymized) examples from our customers and what you can do to protect yourself.

Speakers
avatar for Amir Shaked

Amir Shaked

VP Research, PerimeterX
Amir Shaked is a software engineer and security researcher. He has been writing code from the age of 14, and worked at various startups and enterprises ever since. Today he is VP of research at PerimeterX, fending of automated attacks from websites. Amir specializes in web and data... Read More →



Wednesday October 18, 2017 14:30 - 15:15 IDT
Main Auditorium
  Defender

14:30 IDT

Well, That Escalated Quickly!
Docker developers are a prime target for attackers. In this talk, we will break down a complex attack on Docker developers. We start by getting the victim to visit a malicious web page, from there we get persistent and concealed access to the hosts' machine via an attack we call Shadow Containers.

Speakers
SD

Sagie Dulce

Sr Security Researcher, Aqua Security
Sagie Dulce is a Cyber Security researcher with over 10 years of experience. Sagie started his cyber security career in the intelligence unit 8200 of the IDF, where he performed mostly offense research. From there, Sagie moved to the private sector in Imperva; focusing on defenses... Read More →



Wednesday October 18, 2017 14:30 - 15:15 IDT
Room 10 - CS and Communications Building
  DevSecOps

15:25 IDT

Don't let the cuteness fool you - Exploiting IoT's MQTT protocol

"Connect all the things!" is, for some time now, the main theme when talking about IoT devices, solutions and products. Our eagerness to find new, at times - innovative, ways to make anything to rhyme along the anthem of the internet is a great promise for malicious activity.

As those devices supposed to be lightweight they mostly rely on a small fingerprint stack of protocols - one of those protocols is the message protocol - MQTT.

We will go deep into protocol details, observe how common is to find such devices (and how), and several novel ways to abuse any one of tens of thousands easily spotted publicly facing MQTT brokers on the internet for "fun and profit".

During the presentation we will learn about - WHAT is using MQTT (common and extreme examples) - How SPREAD OUT it is? I’ll be sharing statistical information on different MQTT brokers and version fragmentation collected during research - An OVERVIEW of o its infrastructure and protocol bit & bytes (no prior knowledge required, your head won’t be blown). o General purpose TOOLS – libraries, open source software and apps - RECON – exploring device’s settings, gathering intel, spotting vulnerable devices (+ dropping tools) - Identifying clients - EXPLOITING bad configurations for fun and profit (+ in-the-wild examples): o Spy on subscribers via MQTT o Running remote code on connected devices. o Hijack unsuspected servers and utilize them for evil (e.g. botnet communication). o Misconfigured broker spits machine’s credentials. - DEMOs - Notes on securing your own MQTT-wielding IoT device. - All tools and scripts that were used will be shared right after the talk

Speakers
avatar for dalmoz (Moshe Zioni)

dalmoz (Moshe Zioni)

Director of Threat Research, Akamai
Moshe (dalmoz) have been researching security since youth, positioned professionally since he was 18, when was actually surprised to find a place for his enthusiasm and talent. Consulted many industry leaders, banks, software vendors, insurance companies, health organizations, governments... Read More →


Wednesday October 18, 2017 15:25 - 16:10 IDT
Main Auditorium

15:25 IDT

Securing Your Systems With Vault
In the modern cloud, highly available and reliable data is key to orchestration of independent services which need to pop in & out of existence, seemingly at random, but how do we secure shared configuration and application secrets? In this talk I'll introduce a tool designed just for this purpose!

Speakers
IG

Issac Goldstand

Principal Enterprise Architect, ironSource
Issac has been involved in the Web community for over 15 years. With a strong background in the Apache Web Server internals, and optimizing web applications, Issac continues to churn out highly optimized web applications in a variety of languages and servers, as well as mentoring... Read More →


Wednesday October 18, 2017 15:25 - 16:10 IDT
Room 10 - CS and Communications Building
  Builder
  • Technical Level All

16:10 IDT

Coffee Break
Wednesday October 18, 2017 16:10 - 16:30 IDT
CS Building and Garden

16:30 IDT

Adversarial Machine Learning: 'Some rules can be bent, others can be broken'
Offensive AI allows us to leverage techniques used by ML algorithm to gauge their weak points and exploiting them. ML is great at identifying and classifying patterns, but an attacker can use the gray areas to influence (or even subvert) the pattern matching algorithms.

Speakers
avatar for Guy Barnhart-Magen

Guy Barnhart-Magen

OS Hardening, Security Architecture and Embedded Devices, Cyber Security Consultant
BSidesTLV co-founder and CTF lead, Public speaker, and recipient of the Cisco “black belt” security ninja honor – Cisco’s highest cyber security advocate rank.With nearly 20 years of experience in the cyber-security industry, Guy held various positions in both corporates and... Read More →



Wednesday October 18, 2017 16:30 - 17:15 IDT
Main Auditorium
  Breaker

16:30 IDT

Are you ready for OpenID Connect?
Do you know what is the OpenID Connect protocol?
Do you want to understand why Google, Microsoft and other internet companies use it?
Do you want to enable the OpenID Connect protocol authentication server in your organization?
You need to come to this lecture to get answers to these questions.

Speakers
MF

Michael Furman

Security Architect, Tufin
I have over 10 years of experience with application security. During the last 3+ years I am the Lead Security Architect for Tufin which is the leading provider of security policy orchestration solutions. I am responsible for the overall security of Tufin Orchestration Suite which... Read More →



Wednesday October 18, 2017 16:30 - 17:15 IDT
Room 10 - CS and Communications Building
  Builder
  • Technical Level All

17:20 IDT

Closing Note and Award Ceremony
Wednesday October 18, 2017 17:20 - 17:30 IDT
Main Auditorium
 
Filter sessions
Apply filters to sessions.