logo
Dates

Author


Conferences

Tags

Sort by:  

Authors: Matt Turner, Francesco Beltramini
2023-04-20

tldr - powered by Generative AI

The presentation discusses the importance of intelligence-driven defense in cybersecurity and how it can be implemented in cloud-native infrastructure using automation and orchestration tools.
  • Intelligence-driven defense involves knowing the enemy and their tactics to break the kill chain
  • Attack is an open-source framework that provides a taxonomy of tactics and techniques used by attackers
  • SOAR (Security Orchestration Automation Response) is a platform that enables organizations to collect data about security threats and respond to security events with little or no human assistance
  • Cloud-native platforms offer advanced capabilities and automation tools that can be leveraged for incident response
  • GitOps can provide an audit trail and a deterministic, reproducible way of working
  • An operator can be used to automate response actions based on security events
Authors: Javan Rasokat
2022-11-18

This talk deals with ‘race conditions’ in web applications. From 2021 to 2022 we have seen an increase in race condition reports with huge bugbounty payouts affecting MS, AWS, Instagram and others, for example, leading to MFA-Bypass. According to MITRE it is still a big "research gap" and based on how easily race conditions are introduced into code and how difficult they are to detect, there are probably still a lot of vulnerable applications out there. This type of vulnerability allows an attacker to create unforeseen states as a result of overlapping and parallel program code sequences. By cleverly exploiting these conditions, advantages can be gained, such as bypassing anti-brute force mechanisms, overriding limits, overvoting, and other attack scenarios. As part of this talk a developed penetration testing tool with a distributed approach and a demo web application that is vulnerable to this type of attack is being presented. With help of the demo application and the developed race condition testing tool real-world attack scenarios will be demonstrated. Also results of tested SAST/DAST tools will be given to show how difficult it is to prevent and also test for race condition vulnerabilities.  The learning objects are:1. Introduction to the Race Condition and TOCTOU vulnerabilities, how they work and why exploiting them can be attractive to an attacker, how little is known about them and perhaps too often overlooked in penetration testing.2. How easily the vulnerability exists in various web programming languages. And in which frameworks the vulnerabilities exist by default (example of a vulnerable PHP code snippet with race condition - "would you find it in a code review?").3. Why our existing toolset consisting of DAST/SAST!/RASP/WAF etc. has difficulty preventing or detecting these vulnerabilities, and why it is necessary to look for race condition vulnerabilities as part of a penetration test.4. Actual and impressive attack scenarios from bugbounty reports have been implemented in a vulnerable demo application and will be attacked during a live demo. The audience with the mindset of a breaker will learn how to test for race conditions during penetration testing.