Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Thinking Like an Attacker
Search
Nick Le Mouton
February 05, 2018
Technology
0
100
Thinking Like an Attacker
Nick Le Mouton
February 05, 2018
Tweet
Share
Other Decks in Technology
See All in Technology
日本の85%が使う公共SaaSは、どう育ったのか
taketakekaho
1
160
顧客の言葉を、そのまま信じない勇気
yamatai1212
1
350
15 years with Rails and DDD (AI Edition)
andrzejkrzywda
0
190
今日から始めるAmazon Bedrock AgentCore
har1101
4
410
M&A 後の統合をどう進めるか ─ ナレッジワーク × Poetics が実践した組織とシステムの融合
kworkdev
PRO
1
450
制約が導く迷わない設計 〜 信頼性と運用性を両立するマイナンバー管理システムの実践 〜
bwkw
3
930
Introduction to Bill One Development Engineer
sansan33
PRO
0
360
CDKで始めるTypeScript開発のススメ
tsukuboshi
1
410
GitHub Issue Templates + Coding Agentで簡単みんなでIaC/Easy IaC for Everyone with GitHub Issue Templates + Coding Agent
aeonpeople
1
220
Data Hubグループ 紹介資料
sansan33
PRO
0
2.7k
Context Engineeringが企業で不可欠になる理由
hirosatogamo
PRO
3
580
Ruby版 JSXのRuxが気になる
sansantech
PRO
0
150
Featured
See All Featured
Imperfection Machines: The Place of Print at Facebook
scottboms
269
14k
Evolution of real-time – Irina Nazarova, EuRuKo, 2024
irinanazarova
9
1.2k
How to train your dragon (web standard)
notwaldorf
97
6.5k
The Anti-SEO Checklist Checklist. Pubcon Cyber Week
ryanjones
0
66
Typedesign – Prime Four
hannesfritz
42
2.9k
Ten Tips & Tricks for a 🌱 transition
stuffmc
0
68
My Coaching Mixtape
mlcsv
0
48
Performance Is Good for Brains [We Love Speed 2024]
tammyeverts
12
1.4k
Money Talks: Using Revenue to Get Sh*t Done
nikkihalliwell
0
150
The Art of Programming - Codeland 2020
erikaheidi
57
14k
Designing for Performance
lara
610
70k
Testing 201, or: Great Expectations
jmmastey
46
8k
Transcript
Thinking Like an Attacker (Hacking Your Own Organisation)
# whoami • Nick Le Mouton (@noodlesnz) • CTO Drugs.com
• Developer • Security • Operations
None
None
None
Googlebot
A2:2017 Broken Authentication
None
• Disconnect between security and developers • Security find vulnerabilities
• Developers fix vulnerabilities • Security often don’t impart how they found the vulnerabilities in the first place
• Best position to attack an application • Shift Mindset
• Logic and knowledge
None
None
Object Injection Example • A8:2017 Insecure Deserialization
None
None
GuzzleHttp\Cookie\CookieJar
Payload
None
None
Blind XSS • A7:2017-Cross-Site Scripting (XSS) • Security scan shows
no XSS vulnerability
XSS Hunter
So How Can I Do That? • Offensive Security Courses
• Hack Yourself First by Troy Hunt (pluralsight.com) • https://infosec101.nz/
• Start hacking things, find out what works and what
doesn’t • Damn Vulnerable Web Application (DVWA) • OWASP Juice Shop Project
CTFs • CTFLearn.com • Find upcoming online CTFs on ctftime.org
• Read write ups at ctftime.org/writeups
Thank You