BruCON 0x05 has ended
This schedule is subject to change, check back regularly.
Registrations start at 8h30!
Workshop rooms in the location Novotel are 5 minutes walking from the main venue.
Workshop seats are limited to max 30 persons in rooms Orval, Chimay & La Trappe Seats will be on a first come first serve basis, please be there in time
back to BruCON web site.
TIP: to see as grid: click on the "Schedule button"  
avatar for Assem Chelli

Assem Chelli

Assem got his State Engineer degree in 2010 at the National Higher School of Computer Science Algiers (ESI) and worked for 2 years in the same institution as a Computing Engineer.  Assem is currently a Master Student at the same university.  Assem contributed for years to many Open Source projects. Assem is one of GSoC 2013 selected students for OWASP OWTF and is responsible for the reporting system.  Assem is big Python fan, and an active Githuber. Assem can be contacted at assem[dot]ch[at]gmail.

OWASP OWTF, the Offensive (Web) Testing Framework, is an OWASP+PTES-focused try to unite great tools and make pen testing more efficient, written mostly in Python @owtfp http://owtf.org.

OWTF aims to cover as much as possible from both:

1) The OWASP Testing Guide
2) The Penetration Testing Execution Standard

This coverage is achieved through a combination of automated tests, interactive reports and assistance to human exploitation through relevant third-party links or tools. All this happens using an interactive interface that allows the human to rank information based on the context of their pen-test.
In this presentation there will be special focus on the Summer Storm releases, which result from the outstanding work of 4 GSoC students working on OWTF full-time for 3 months.


My Speakers Sessions

Friday, September 27

3:30pm CEST