<?xml version='1.0' encoding='utf-8' ?>
<!-- Made with love by pretalx v1.1.2. -->
<schedule>
    <generator name="pretalx" version="1.1.2" />
    <version>0.4</version>
    <conference>
        <acronym>okf219</acronym>
        <title>OWASP Kyiv Fall 2019</title>
        <start>2019-11-23</start>
        <end>2019-11-23</end>
        <days>1</days>
        <timeslot_duration>00:05</timeslot_duration>
        <base_url>https://cfp.owaspukraine.org/okf219/schedule/</base_url>
    </conference>
    <day index='1' date='2019-11-23' start='2019-11-23T04:00:00+02:00' end='2019-11-24T03:59:00+02:00'>
        <room name='Grammarly'>
            <event guid='9bf3bcc8-542b-5c71-a3ea-d2d75fd15c3c' id='84'>
                <date>2019-11-23T10:00:00+02:00</date>
                <start>10:00</start>
                <duration>00:40</duration>
                <room>Grammarly</room>
                <slug>okf219-84-cilium-network-security-for-microservices-let-s-see-how-it-works-with-istio</slug>
                <url>https://cfp.owaspukraine.org/okf219/talk/GS3WNJ/</url>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <title>Cilium - Network Security for Microservices. Let&apos;s See How It Works with Istio</title>
                <subtitle></subtitle>
                <track></track>
                <type>Talk</type>
                <language>en</language>
                <abstract>Cilium is a CNI -compliant networking plugin used to provide multi-host network connectivity for Linux containers and a way to define granular network-layer and application-layer security policies.</abstract>
                <description>Cilium brings API-aware network security filtering to Linux container frameworks like Docker and Kubernetes. Using a new Linux kernel technology called BPF, Cilium provides a simple and efficient way to define and enforce both network-layer and application-layer security policies based on container/pod identity.</description>
                <logo></logo>
                <persons>
                    <person id='34'>Stanislav Kolenkin</person>
                </persons>
                <links></links>
                <attachments></attachments>
            </event>
            <event guid='5a20cbe6-f827-50e3-86c9-93e8f144a82f' id='87'>
                <date>2019-11-23T11:00:00+02:00</date>
                <start>11:00</start>
                <duration>00:40</duration>
                <room>Grammarly</room>
                <slug>okf219-87-quarantine-nights-exploiting-macos-file-quarantine-in-popular-apps</slug>
                <url>https://cfp.owaspukraine.org/okf219/talk/XYH7EV/</url>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <title>Quarantine Nights: exploiting macOS File Quarantine in popular apps</title>
                <subtitle></subtitle>
                <track></track>
                <type>Talk</type>
                <language>en</language>
                <abstract>Quarantine Nights: exploiting macOS File Quarantine in popular apps</abstract>
                <description></description>
                <logo>/media/okf219/images/XYH7EV/Screenshot_2019-11-23_at_05.53.28.png</logo>
                <persons>
                    <person id='125'>Vladimir Metnew</person>
                </persons>
                <links></links>
                <attachments></attachments>
            </event>
            <event guid='7e248fb6-540e-5de1-93e3-e47f0f5c6325' id='88'>
                <date>2019-11-23T12:00:00+02:00</date>
                <start>12:00</start>
                <duration>00:40</duration>
                <room>Grammarly</room>
                <slug>okf219-88-injections-4-ways-of-penetration</slug>
                <url>https://cfp.owaspukraine.org/okf219/talk/RHPPSG/</url>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <title>Injections  - 4 Ways of Penetration</title>
                <subtitle></subtitle>
                <track></track>
                <type>Talk</type>
                <language>en</language>
                <abstract>I will show 4 types of injections and we will discuss how to protect against them.</abstract>
                <description></description>
                <logo></logo>
                <persons>
                    <person id='92'>Evgeny Tolchinsky</person>
                </persons>
                <links></links>
                <attachments></attachments>
            </event>
            <event guid='2d7b8169-c6dd-50de-b31d-36dd3808b66c' id='83'>
                <date>2019-11-23T13:00:00+02:00</date>
                <start>13:00</start>
                <duration>00:40</duration>
                <room>Grammarly</room>
                <slug>okf219-83-pentest-expectations</slug>
                <url>https://cfp.owaspukraine.org/okf219/talk/P89CL9/</url>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <title>Pentest Expectations</title>
                <subtitle></subtitle>
                <track></track>
                <type>Talk</type>
                <language>en</language>
                <abstract>What do pentesters looking for and what customers wish to receive in their reports? 
Examples of easy account compromise. 

What do pentesters look for the rest of the project time? 
Classic OWASP checklist. 

What are pentesters tired to report but still have to</abstract>
                <description>What do we expect? A total compromise.
&#8226; Account Takeover
&#8226; Logic Bypass
&#8226; Remote Code Execution
&#8226; Easy Exploitation

What do we get? OWASP daily work.
&#8226; XSS
&#8226; CSRF
&#8226; Session Fixation
&#8226; IDOR
&#8226; Information Disclosure
&#8226; Unlimited Email Spam
&#8226; ARP poisoning
&#8226; Mountable NFS volumes

What are we bored of in the reports?
&#8226; Versions
&#8226; Ciphers
&#8226; Headers
&#8226; Checklists
&#8226; False Positives
&#8226; Automatic Reports

How to get an empty pretest report?</description>
                <logo>/media/okf219/images/P89CL9/Screenshot_1.png</logo>
                <persons>
                    <person id='123'>Ihor uZ</person>
                </persons>
                <links></links>
                <attachments></attachments>
            </event>
            <event guid='b7185dcf-5490-50f3-9a60-65761192961c' id='82'>
                <date>2019-11-23T15:00:00+02:00</date>
                <start>15:00</start>
                <duration>00:40</duration>
                <room>Grammarly</room>
                <slug>okf219-82-hacktoberfest--open-source</slug>
                <url>https://cfp.owaspukraine.org/okf219/talk/NHK7YG/</url>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <title>Hacktoberfest &#1090;&#1072; open-source</title>
                <subtitle></subtitle>
                <track></track>
                <type>Talk</type>
                <language>en</language>
                <abstract>&#1042;&#1110;&#1076;&#1082;&#1088;&#1080;&#1090;&#1090;&#1103; &#1076;&#1083;&#1103; &#1089;&#1077;&#1073;&#1077; _open-source_, &#1091;&#1095;&#1072;&#1089;&#1090;&#1100; &#1091; **Hacktoberfest** &#1090;&#1072; &#1095;&#1086;&#1084;&#1091; &#1074;&#1072;&#1088;&#1090;&#1086; &#1087;&#1088;&#1080;&#1076;&#1110;&#1083;&#1103;&#1090;&#1080; &#1091;&#1074;&#1072;&#1075;&#1091; &#1087;&#1088;&#1086;&#1077;&#1082;&#1090;&#1072;&#1084; &#1079; &#1074;&#1110;&#1076;&#1082;&#1088;&#1080;&#1090;&#1080;&#1084; &#1082;&#1086;&#1076;&#1086;&#1084;.</abstract>
                <description>* Hacktoberfest.
* &#1047; &#1103;&#1082;&#1080;&#1093; &#1087;&#1088;&#1086;&#1077;&#1082;&#1090;&#1110;&#1074; &#1074;&#1072;&#1088;&#1090;&#1086; &#1087;&#1086;&#1095;&#1080;&#1085;&#1072;&#1090;&#1080; &#1089;&#1074;&#1110;&#1081; &#1096;&#1083;&#1103;&#1093;.
* &#1063;&#1086;&#1084;&#1091; &#1094;&#1077; &#1084;&#1072;&#1108; &#1079;&#1085;&#1072;&#1095;&#1077;&#1085;&#1085;&#1103;.
* &#1063;&#1080; &#1073;&#1091;&#1076;&#1077; &#1079; &#1094;&#1100;&#1086;&#1075;&#1086; &#1074;&#1080;&#1075;&#1086;&#1076;&#1072;.</description>
                <logo></logo>
                <persons>
                    <person id='122'>Mykhailo Pazyniuk</person>
                </persons>
                <links></links>
                <attachments></attachments>
            </event>
            <event guid='4958d881-5f1a-54d5-b6d9-787220c1131c' id='85'>
                <date>2019-11-23T16:00:00+02:00</date>
                <start>16:00</start>
                <duration>00:40</duration>
                <room>Grammarly</room>
                <slug>okf219-85-basic-ideas-of-osint-and-why-it-is-useful</slug>
                <url>https://cfp.owaspukraine.org/okf219/talk/JR9BPR/</url>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <title>Basic Ideas of OSINT and Why It Is Useful</title>
                <subtitle></subtitle>
                <track></track>
                <type>Talk</type>
                <language>en</language>
                <abstract>Describing what is OSINT. Describing a couple of OSINT tools: Censys.io, Google Dorks, The Harvester, Shodan, Nmap, etc.</abstract>
                <description>Describing what is OSINT. Describing a couple of OSINT tools: Censys.io, Google Dorks, The Harvester, Shodan, Nmap, etc.</description>
                <logo></logo>
                <persons>
                    <person id='101'>Nadia Klymenko</person>
                </persons>
                <links></links>
                <attachments></attachments>
            </event>
            
        </room>
        
    </day>
    
</schedule>
