Loading…
View analytic

Log in to bookmark your favorites and sync them to your phone or calendar.

Tuesday, October 17
 

08:30

09:30

OWT Training Day
Speakers
avatar for Shay Chen

Shay Chen

CEO, Effective Security
Shay Chen is the CEO of Effective Security, an information-security boutique company specializing in information security assessments and in automating security processes of vulnerability management and SDLC. He has over twelve years in information technology and security, a stro... Read More →


Tuesday October 17, 2017 09:30 - 17:30
Main Auditorium

17:30

WIA (Women in AppSec)
Mentors
avatar for Irene Abezgauz

Irene Abezgauz

Co-founder, VP Product, Cymmetria
Breaking and building stuff, everything security and almost anything technology.
avatar for Keren Elazari

Keren Elazari

@k3r3n3, BSidesTLV
As an independent analyst and strategic advisor, I write , research and speak about emerging security trends and technologies and help global organizations navigate complex cyber security issues. My research and writing about security has been featured by NATO, WIRED, TED, Scientific American and the Financial Times, to name a few. I hold... Read More →
avatar for Limor Kessem

Limor Kessem

Security Evangelist, IBM Security
HM

Hila Meller

Head of Security Services South Region, dxc Technology
SP

Smadar Paradise

Director cyber security protection, Check Point
SS

Shira Shamban

Data initiative lead, Dome9 Security

Tuesday October 17, 2017 17:30 - 20:30
Main Auditorium
 
Wednesday, October 18
 

08:30

09:30

Opening Words
Organizers
avatar for Avi Douglen

Avi Douglen

Security Bouncer, Bounce Security Ltd.
Software security is my passion, "Builder" is my focus, consulting is my profession, research and programming my hobbies. I run the OWASP Israel chapter, and also Security.StackExchange. I enjoy good beer, whisky, and my 5 kids. And lots of other stuff too... :-)

Wednesday October 18, 2017 09:30 - 10:00
Main Auditorium

10:10

Call the plumber - you have a leak in your (named) pipe
As presented in the last Def Con Las Vegas:
Windows named pipes is a largely unfamiliar interface, or often mistekenly considered as an internal-only communication interface.

In this talk I will present how named pipes vulnerabilities can be exploited for remote denial of service, remote code execution and other dangerous attacks.

Speakers
GC

Gil Cohen

CTO, Comsec
Gil is an experienced application security instructor, architect, consultant and pentester just starting his 12th year in the field. _x000D_ | With past experience in the civilian, government and military cyber security industries, Gil currently serves as the CTO of Comsec Group... Read More →


Wednesday October 18, 2017 10:10 - 10:55
Room 10 - CS and Communications Building
  • Technical Level All

10:10

Authentication Without Authentication
Authentication is important, but how do you authenticate when user interaction is not an option? For example, an IoT app without a user interface. We need to authenticate the app - without any predefined credentials. Want to see how? Join me for this session, including a live demo on Raspberry Pi!

Speakers
avatar for Omer Levi Hevroni

Omer Levi Hevroni

Security Champion, Soluto
Writing code for the last 10 years. Security Champion and Software Developer at Soluto for the last 3 years.


Wednesday October 18, 2017 10:10 - 10:55
Main Auditorium

10:15

CtF Workshop #1 - Breaking Clouds

With over half of the fortune 500 on board, Cloud Foundry is considered to be the world's leading cloud platform. In this session, we will show some very interesting vulnerabilities that we identified and responsibly disclosed over this year to the platform's maintainers. We will discuss issues in working with zip files, using parameters in ruby-rack as well as various cases of time-of-check vs time-of-use and expand on each issue with a barrage of real world examples. 

In the second part of the session we will work out how migrating applications to a cloud environment might open them up to new and exciting vectors that are otherwise considered unexploitable.

We will see how with new technologies come new vulnerabilities and sometimes, it's just the old vulnerabilities that are making a comeback. 

Attendees could perform the learnt attacks on a pre-configured environment during the workshop.


Workshoppers
ES

Eran Shmuely

Sr Staff Cyber Security Researcher, GE Digital
VS

Vladi Sandler

Security Researcher, GE


Wednesday October 18, 2017 10:15 - 11:45
Room 37 - CS and Communications Building

11:00

11:05

IP Protection: How NOT to implement the license protection in .NET systems
IP is most valued property of the company, especially start-up.
There are many ways to implement the license protection in .NET systems.
Most, if not all, ways are wrong and can be easily compromised.
Discussed common methods to protect the license and methods to crack it

Speakers
avatar for Vlad Bukin

Vlad Bukin

Security Research Manager, WAF, SpiderLabs, Trustwave
I am developer from dinosaur era - late 80-x of previous century. From this pre-historic time I am passionate about computers and software. I worked many years in software development area in many dev and lead roles: developer, leading developer, system architect, algorithm devel... Read More →


Wednesday October 18, 2017 11:05 - 11:50
Room 10 - CS and Communications Building

11:05

Bleeding Secrets!
We do our best to protect the servers' information using security controls like TLS communication, Firewall and advanced security cloud services, but then they bleed secrets (arbitrary pieces of memory are leaked to a potential attacker).

This talk observes three zero days found within security solutions (two from this year) that can be the cause for data breaches like the one from May 31 where OneLogin was breached and encrypted secrets were stolen in clear text.
We will review code, understand the vulnerabilities, assess the root cause, challenge a few assumptions (on open-source, security solutions and others) and review some best practices that can help prevent such vulnerabilities.

Speakers
avatar for Ofer Rivlin

Ofer Rivlin

Product Security Lead, CyberArk
Security Architect and Researcher. | Leading the R&D product security at CyberArk | Previously a security architect of enterprise and cloud solutions at SAP and General Motors, as well as a senior security researcher (Mobile, Java, Android and IOS) and a senior software archi... Read More →


Wednesday October 18, 2017 11:05 - 11:50
Main Auditorium
  • Technical Level All

11:50

Coffee Break
Wednesday October 18, 2017 11:50 - 12:15
CS Building and Garden

12:15

Infusing Security Awareness in Agile Product Management
The goal of our session is to inspire organizations to increase their security conscience, by addressing the security from both process and content points of view.
As part of the Shift Left movement in the world of security,we'd like to suggest a surprising security ambassador: The Product Manager.

Speakers
avatar for Elena Kravchenko

Elena Kravchenko

ADM BU Security Lead, Micro Focus (former HPE Software)
Elena represents the Security side of the project and brings vast experience in both development and security areas. | | She is responsible for a department developing 12 products ( ~400 developers) | | HPE Software Security Lead for HPE's Application Delivery Management (A... Read More →
avatar for Efrat Wasserman

Efrat Wasserman

Product manager, Intel
Efrat is a Product Manager at Intel. | Efrat brings deep knowledge and experience in both software development and project/product management areas. | Efrat's former position was a Senior Program Manager at HPE SW, | Efrat holds a BSc in Computer Science and Mathematics and... Read More →


Wednesday October 18, 2017 12:15 - 13:00
Main Auditorium
  • Technical Level All

12:15

How to get the best AppSec test of your life
The Internet is full of advice on delivering a better pen test. That's great but what if you are the one arranging or receiving the test? In this talk, I want to use my experience of scoping and delivering these tests to give you, the recipient, ideas on how to get the best value from AppSec tests.

Speakers
avatar for Josh Grossman

Josh Grossman

Team Leader, Application Security, Comsec Group
Josh Grossman has spent many years as an IT Security and Risk Consultant as well as a Software Developer. In that time he has seen the good, the bad and the stuff which is sadly still covered by an NDA. Josh has spent the last few years leading and delivering application security... Read More →


Wednesday October 18, 2017 12:15 - 13:00
Room 10 - CS and Communications Building

12:15

CtF Workshop #2 - Exploiting Authentication Issues For 25,000$

Authentication mechanisms are considered to be the most sensitive part of any application and yet they seem to be some of the most prone for implementation errors. In this session, the security researcher will discuss how he broke the authentication mechanisms for some of the biggest applications in the world (Uber, Yahoo, Twitter, etc.). He will present advanced practical ways of exploiting SSO mechanisms such as SAML and OAuth, as well as user invitations and password reset mechanisms. 

In the second part of this session we will examine how CSP(Content Security Policy) helped fixing one of the vulnerabilities and we will elaborate about the various security-related HTTP security headers described by The Internet Engineering Task Force (IETF).

A security researcher from GE Digital will discuss what each one of these headers does to help augment web application security and under what circumstances they could be bypassed by a clever adversary. 

Attendees could perform the learnt attacks on a pre-configured environment during the workshop.


Workshoppers
avatar for Michael Reizelman

Michael Reizelman

Security Researcher, GE Digital


Wednesday October 18, 2017 12:15 - 13:45
Room 37 - CS and Communications Building

13:10

Stranger Danger: Addressing Security Risk in Open Source Code

Open source modules, maven and python packages, ruby gems and especially npm, are undoubtedly awesome. However, they also represent an undeniable and massive risk. You’re introducing someone else’s code into your system, often with little or no scrutiny. The wrong package can introduce severe vulnerabilities into your application, exposing your application and your users data.

The security risk from vulnerable open source binaries is well understood. While still often mishandled, there are good practices for tackling it, and industry trends like Serverless & PaaS all but eliminate it.

Vulnerabilities in open source code packages, however, get practically no air time. These packages, pulled from the likes of npm, RubyGems and Maven, are just as prevalent, outdated and hard to manage. More importantly, they’re just as vulnerable!

In this talk I’ll share details and demonstrate several vulnerabilities in popular packages. For each issue, I’ll explain why it happened, show its impact, and – most importantly – see how to avoid or fix it.


Speakers
avatar for Danny Grander

Danny Grander

Security Research, Snyk
Danny Grander is a veteran security researcher and the cofounder of Snyk.io, where he works on open source security and leads Snyk’s security research. Previously, Danny was the CTO of Gita and a lead researcher and developer for a few startups. Danny’s CTF team, Pasten, won... Read More →


Wednesday October 18, 2017 13:10 - 13:35
Main Auditorium

13:10

The Short History and The Bright Future of Mobile Banking Trojans
Financial Trojans for Mobile have been evolving quickly in recent years, I'll be presenting a few old tricks and a few new tricks these trojans have adopted.

Speakers
avatar for Julia Karpin

Julia Karpin

Sr. Malware Researcher, F5 Networks
Julia Karpin is a reverse engineer at the F5 security research team. She has been dealing with financial malware and their shenanigans since 2012. Her main interest is Windows\Android malware research and automating every research aspect that can be automated.


Wednesday October 18, 2017 13:10 - 13:35
Room 10 - CS and Communications Building

13:40

Lunch
Wednesday October 18, 2017 13:40 - 14:30
CS Building and Garden

14:15

CtF Workshop #3 - Cache me if you can

Hash functions are all around us, being used for a variety of applications such as data integrity verification, de-duplication algorithms and as pointer generators in hash-tables. In this session a security researcher from GE Digital will discuss and demonstrate the differences between cryptographic and none-cryptographic hashes, generating collisions and performing cache poisoning and timing attacks against applications that use hashing naively. 


Attendees could perform the learnt attacks on a pre-configured environment during the workshop.


Workshoppers
avatar for Amit Kaplan

Amit Kaplan

Cyber Security Researcher, GE Digital
BSc in Communication systems engineering from Ben Gurion University of the Negev. Currently work as Cyber Security Resercher. | My main fields of interest are Cryptography and Side-Channel Attacks. And Whisky........


Wednesday October 18, 2017 14:15 - 15:15
Room 37 - CS and Communications Building

14:30

Bots and Carts
This lecture will go over some examples of automated attacks targeting eCommerce websites and specifically the cart and purchase flow. We will discuss some real (yet anonymized) examples from our customers and what you can do to protect yourself.

Speakers
avatar for Amir Shaked

Amir Shaked

VP Research, PerimeterX
Amir Shaked is a software engineer and security researcher. He has been writing code from the age of 14, and worked at various startups and enterprises ever since. Today he is VP of research at PerimeterX, fending of automated attacks from websites. Amir specializes in web and da... Read More →


Wednesday October 18, 2017 14:30 - 15:15
Main Auditorium

14:30

Well, That Escalated Quickly!
Docker developers are a prime target for attackers. In this talk, we will break down a complex attack on Docker developers. We start by getting the victim to visit a malicious web page, from there we get persistent and concealed access to the hosts' machine via an attack we call Shadow Containers.

Speakers
SD

Sagie Dulce

Sr Security Researcher, Aqua Security
Sagie Dulce is a Cyber Security researcher with over 10 years of experience. Sagie started his cyber security career in the intelligence unit 8200 of the IDF, where he performed mostly offense research. From there, Sagie moved to the private sector in Imperva; focusing on defense... Read More →


Wednesday October 18, 2017 14:30 - 15:15
Room 10 - CS and Communications Building

15:25

Don't let the cuteness fool you - Exploiting IoT's MQTT protocol

"Connect all the things!" is, for some time now, the main theme when talking about IoT devices, solutions and products. Our eagerness to find new, at times - innovative, ways to make anything to rhyme along the anthem of the internet is a great promise for malicious activity.

As those devices supposed to be lightweight they mostly rely on a small fingerprint stack of protocols - one of those protocols is the message protocol - MQTT.

We will go deep into protocol details, observe how common is to find such devices (and how), and several novel ways to abuse any one of tens of thousands easily spotted publicly facing MQTT brokers on the internet for "fun and profit".

During the presentation we will learn about - WHAT is using MQTT (common and extreme examples) - How SPREAD OUT it is? I’ll be sharing statistical information on different MQTT brokers and version fragmentation collected during research - An OVERVIEW of o its infrastructure and protocol bit & bytes (no prior knowledge required, your head won’t be blown). o General purpose TOOLS – libraries, open source software and apps - RECON – exploring device’s settings, gathering intel, spotting vulnerable devices (+ dropping tools) - Identifying clients - EXPLOITING bad configurations for fun and profit (+ in-the-wild examples): o Spy on subscribers via MQTT o Running remote code on connected devices. o Hijack unsuspected servers and utilize them for evil (e.g. botnet communication). o Misconfigured broker spits machine’s credentials. - DEMOs - Notes on securing your own MQTT-wielding IoT device. - All tools and scripts that were used will be shared right after the talk

Speakers
avatar for dalmoz (Moshe Zioni)

dalmoz (Moshe Zioni)

Security Research Manager, Verint
Moshe (dalmoz) have been researching security since youth, positioned professionally since he was 18, when was actually surprised to find a place for his enthusiasm and talent. Consulted many industry leaders, banks, software vendors, insurance companies, health organizations, go... Read More →


Wednesday October 18, 2017 15:25 - 16:10
Main Auditorium

15:25

Securing Your Systems With Vault
In the modern cloud, highly available and reliable data is key to orchestration of independent services which need to pop in & out of existence, seemingly at random, but how do we secure shared configuration and application secrets? In this talk I'll introduce a tool designed just for this purpose!

Speakers
IG

Issac Goldstand

Principal Enterprise Architect, ironSource
Issac has been involved in the Web community for over 15 years. With a strong background in the Apache Web Server internals, and optimizing web applications, Issac continues to churn out highly optimized web applications in a variety of languages and servers, as well as mentoring... Read More →


Wednesday October 18, 2017 15:25 - 16:10
Room 10 - CS and Communications Building
  • Technical Level All

16:10

Coffee Break
Wednesday October 18, 2017 16:10 - 16:30
CS Building and Garden

16:30

Adversarial Machine Learning: 'Some rules can be bent, others can be broken'
Offensive AI allows us to leverage techniques used by ML algorithm to gauge their weak points and exploiting them. ML is great at identifying and classifying patterns, but an attacker can use the gray areas to influence (or even subvert) the pattern matching algorithms.

Speakers
avatar for Guy Barnhart-Magen

Guy Barnhart-Magen

Cyber Security Manager, Intel
Mr. Barnhart-Magen has over 15 years of experience in the cyber-security industry. He is currently a security research manager at Intel, where he focuses on reverse engineering and researching various embedded systems. Previously he joined Nation-E (an Industrial IoT startup) whe... Read More →



Wednesday October 18, 2017 16:30 - 17:15
Main Auditorium

16:30

Are you ready for OpenID Connect?
Do you know what is the OpenID Connect protocol?
Do you want to understand why Google, Microsoft and other internet companies use it?
Do you want to enable the OpenID Connect protocol authentication server in your organization?
You need to come to this lecture to get answers to these questions.

Speakers
MF

Michael Furman

Lead Security Architect, Tufin
I have over 10 years of experience with application security. | During the last 3+ years I am the Lead Security Architect for Tufin which is the leading provider of security policy orchestration solutions. I am responsible for the overall security of Tufin Orchestration Suite w... Read More →



Wednesday October 18, 2017 16:30 - 17:15
Room 10 - CS and Communications Building
  • Technical Level All

17:20

Closing Note and Award Ceremony
Wednesday October 18, 2017 17:20 - 17:30
Main Auditorium