{"id":146524442,"date":"2023-04-13T09:25:00","date_gmt":"2023-04-13T09:25:00","guid":{"rendered":"https:\/\/danconn.dev\/blog\/2023\/04\/13\/bsides-lancashire\/"},"modified":"2024-07-28T10:42:45","modified_gmt":"2024-07-28T10:42:45","slug":"bsides-lancashire","status":"publish","type":"post","link":"https:\/\/danconn.dev\/blog\/2023\/04\/13\/bsides-lancashire\/","title":{"rendered":"BSides Lancashire"},"content":{"rendered":"<h2 class=\"wp-block-heading\">I go up t&#8217;North to talk about Removing Damn Vulnerable Code, DJ for Cyber House Party and experience the beauty that is butter pie! We don&#8217;t do owt by halves!<\/h2><p>I always thought my first BSides would be London and I thought I would have definitely got to one before 2023!! As it was, BSides Lancashire on March 30th 2023 would actually be my first! <br\/>AND WHAT AN EVENT IT WAS! <br\/><br\/>A fantastic road trip with <a href=\"https:\/\/twitter.com\/nikkic360\">Nikki Webb<\/a> and Andy James was a Haribo fun filled adventure in itself where all us were, well as punctual as you\u2019d expect us to be if you know us (to be fair Andy is very punctual)! This followed by a very boozy PreSides in the evening was a great way to start! <\/p><figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/danconn.dev\/blog\/wp-content\/uploads\/2024\/07\/0475575d-1937-4edb-9025-6ccd066d0125_1440x1800.jpeg\" alt=\"\" width=\"404\"\/><\/figure><p>The day itself was packed with many fantastic talks over three rooms. I gotta admit I stayed where I was speaking in Innovation Village for the most part and two talks that I learned a lot from were James Bore\u2019s talk on Information Theory and Sean Wright\u2019s on how to create good AppSec on a Shoestring budget. <\/p><h1 class=\"wp-block-heading\">Removing Damn Vulnerable Code<\/h1><p>My talk was Removing Damn Vulnerable Code. It\u2019s a play on words on various OWASP projects known as \u201cDamn Vulnerable\u201d projects. Essentially they\u2019re projects that are intentionally vulnerable that you can learn to fix up and therefore learn how to code securely. There are various ones, from the original Damn Vulnerable Web App written in PHP that I used to practice with about 10 years ago, to the Java based OWASP Webgoat and many others. <br\/><br\/>The other part of the talk was looking at potential exploits that could be found in code\u2026\u2026 but through the medium of memes! <br\/><br\/>I hope it was as fun to watch as it was to create! Here it is: <\/p><figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Removing Damn Vulnerable Code by Dan Conn\" width=\"500\" height=\"281\" data-cookieconsent=\"preferences, statistics, marketing\" data-src=\"https:\/\/www.youtube.com\/embed\/nCxrCtxrjRM?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><div class=\"cookieconsent-optout-preferences cookieconsent-optout-statistics cookieconsent-optout-marketing\"><\/div>\n<\/div><\/figure><p>We then partied hard in the evening for a vinyl special Cyber House Party where I was joined by <a href=\"https:\/\/x.com\/MarcAverySec\">Mr CHP Marc Avery<\/a> himself and the exquisitely amazing <a href=\"https:\/\/x.com\/safesecs\">Sam Humphries <\/a>from Exabeam. I had loads of fun as always and we raised some great funds for the NSPCC. <br\/><br\/><br\/><\/p>","protected":false},"excerpt":{"rendered":"<p>I go up t&#8217;North to talk about Removing Damn Vulnerable Code, DJ for Cyber House Party and experience the beauty that is butter pie! We don&#8217;t do owt by halves!<\/p>\n","protected":false},"author":2,"featured_media":147072119,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[55],"tags":[12,11,54,13,53,15],"class_list":["post-146524442","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-talks","tag-application-security","tag-appsec","tag-code","tag-cyber-security","tag-secure-code","tag-vulnerability-managment"],"_links":{"self":[{"href":"https:\/\/danconn.dev\/blog\/wp-json\/wp\/v2\/posts\/146524442","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/danconn.dev\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/danconn.dev\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/danconn.dev\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/danconn.dev\/blog\/wp-json\/wp\/v2\/comments?post=146524442"}],"version-history":[{"count":1,"href":"https:\/\/danconn.dev\/blog\/wp-json\/wp\/v2\/posts\/146524442\/revisions"}],"predecessor-version":[{"id":147072251,"href":"https:\/\/danconn.dev\/blog\/wp-json\/wp\/v2\/posts\/146524442\/revisions\/147072251"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/danconn.dev\/blog\/wp-json\/wp\/v2\/media\/147072119"}],"wp:attachment":[{"href":"https:\/\/danconn.dev\/blog\/wp-json\/wp\/v2\/media?parent=146524442"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/danconn.dev\/blog\/wp-json\/wp\/v2\/categories?post=146524442"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/danconn.dev\/blog\/wp-json\/wp\/v2\/tags?post=146524442"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}