{"id":926,"date":"2010-06-15T09:57:00","date_gmt":"2010-06-15T09:57:00","guid":{"rendered":"https:\/\/www-new.brucon.org\/2018\/2010\/06\/15\/brucon-speaker-trainer-at-owasp-be-meeting-wednesday-16th-of-june-on-sql-injection\/"},"modified":"2010-06-15T09:57:00","modified_gmt":"2010-06-15T09:57:00","slug":"brucon-speaker-trainer-at-owasp-be-meeting-wednesday-16th-of-june-on-sql-injection","status":"publish","type":"post","link":"https:\/\/archive.brucon.org\/2018\/2010\/06\/15\/brucon-speaker-trainer-at-owasp-be-meeting-wednesday-16th-of-june-on-sql-injection\/","title":{"rendered":"BruCON speaker\/trainer at OWASP BE meeting Wednesday 16th of June on SQL injection"},"content":{"rendered":"<p><span style=\"font-weight: bold\">Joe McCray <\/span>is in Brussels and will give a talk on SQL injection at an extra OWASP BE Meeting Wednesday 16th of June.<\/p>\n<p>Joe is a also a BruCON 2010 speaker and trainer. He will give a presentation on <a href=\"http:\/\/2010.brucon.org\/index.php\/Presentations#You_Spent_All_That_Money_And_You_Still_Got_Owned...\" title=\"Presentations\">&#8220;You Spent All That Money And You Still Got Owned&#8221;<\/a> next September.<\/p>\n<p><b>Abstract:<\/b> This talk will focus on practical methods of  identifying and bypassing modern enterprise class security solutions  such as Load Balancers, both Network and Host-based Intrusion Prevention  Systems (IPSs), Web Application Firewalls (WAFs), and Network Access  Control Solutions (NAC).  <\/p>\n<p>The goal of this talk is to show IT Personnel the common  weaknesses in popular security products and how those products should be  configured. <\/p>\n<p>He is also giving a pentesting class based on this called <a href=\"http:\/\/2010.brucon.org\/index.php\/Training#Training_.231:_Pentesting_High_Security_Environments\"><span>Pentesting High Security Environments<\/span><\/a>.<\/p>\n<p>This course will focus on penetration testing techniques that can be  used when testing highly secured environments such as 3-letter agencies, DoD, financial  organizations, federal organizations, and large companies. If you are tired of  attacking unpatched Windows 2000 Servers in your hacking courses and want to take a course  where you will be attacking new Operating Systems\/Applications that are patched, locked  down, and protected with an IDS\/IPS then this is the course for you. <\/p>\n<p>The first day of the course starts with attacking heavily  protected environments from the outside and dealing with Network-Based IDS\/IPS. Next is attacking web  applications and dealing with Load Balancing, common application security measures in  PHP\/ASP.NET, and Web Application Firewalls. <\/p>\n<p>The second day covers attacking from the LAN, dealing with NAC  solutions, locked down workstations\/GPOs, and Host-Based IDS\/IPS. The last section of the  course covers gaining control of Active Directory. <\/p>\n<p><span style=\"font-weight: bold\">Joe McCray<\/span> has 8 years of experience in the security industry with a  diverse background that includes network and web application penetration  testing, forensics, training, and regulatory compliance. Joe is a  frequent presenter at security conferences, and has taught the CISSP,  CEH, CHFI, Security+, and Web Application Security at Johns Hopkins  University (JHU), University of Maryland Baltimore College (UMBC), and  several other technical training centers across the country.<\/p>\n<p>Want to join the OWASP BE Meeting????<\/p>\n<p><strong>WHEN<\/strong><\/p>\n<p>June 16th 2010 18h-20h<\/p>\n<p><strong>WHERE<\/strong><\/p>\n<p>Location  is sponsored by Zenitel Belgium.<\/p>\n<p>Location: Zenitel Belgium, Z.1.  Research Park 110 \u2013 1731 Zelli!  k, Belgium (same building as <a href=\"http:\/\/www.u2u.net\/Route.aspx\" target=\"_blank\">http:\/\/www.u2u.net\/Route.aspx<\/a>)<\/p>\n<p>PROGRAM<\/p>\n<p>     * 18h00 &#8211; 18h30: Welcome &amp; Refreshments<br \/>    * 18h30 &#8211; 18h45:  OWASP Update (by Sebastien Deleersnyder, Zenitel, OWASP Board)<br \/>    *  18h45 &#8211; 20h00: Advanced SQL Injection (by Joe McCray, Learn Security  Online)<\/p>\n<p>More information can be found at <a href=\"http:\/\/www.owasp.org\/index.php\/Belgium#tab=Chapter_Meetings\" target=\"_blank\">http:\/\/www.owasp.org\/index.php\/Belgium#tab=Chapter_Meetings<\/a>  .<\/p>\n<p><strong>WHO should attend?<\/strong><\/p>\n<p>Anyone interested  in Web Application Security (management, security<br \/>professionals,  developers, students, etc). OWASP Belgium chapter<br \/>membership is free.  All meetings are free. There are never vendor<br \/>pitches or sales  presentations at OWASP meetings.<\/p>\n<p>Check our chapter page <a href=\"http:\/\/www.owasp.org\/index.php\/Belgium\" target=\"_blank\">http:\/\/www.owasp.org\/index.php\/Belgium<\/a>  on<br \/>meeting details, sign up to the chapter mailing list and  introduce<br \/>yourself.<\/p>\n<p><strong>REGISTRATION<\/strong><\/p>\n<p>Please  send a mail to &#8216;belgium at <a href=\"http:\/\/owasp.org\/\" target=\"_blank\">owasp.org<\/a>&#8216; if  you plan to attend,<br \/>so we can size the venue appropriately and keep  you updated on<br \/>last-minute changes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Joe McCray is in Brussels and will give a talk on SQL injection at an extra OWASP BE Meeting Wednesday 16th of June. Joe is a also a BruCON 2010 speaker and trainer. He will give a presentation on &#8220;You Spent All That Money And You Still Got Owned&#8221; next September. Abstract: This talk will focus on practical methods of identifying and bypassing modern enterprise class security solutions such as Load Balancers, both Network and&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-926","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-uncategorized"},"menu_order":0,"_links":{"self":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/posts\/926","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/comments?post=926"}],"version-history":[{"count":0,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/posts\/926\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/media?parent=926"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/categories?post=926"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/tags?post=926"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}