Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Thinking Like an Attacker
Search
Nick Le Mouton
February 05, 2018
Technology
110
0
Share
Thinking Like an Attacker
Nick Le Mouton
February 05, 2018
Other Decks in Technology
See All in Technology
「責任あるAIエージェント」こそ自社で開発しよう!
minorun365
9
1.8k
Digitization部 紹介資料
sansan33
PRO
1
7.3k
ハーネスエンジニアリングの概要と設計思想
sergicalsix
9
4.4k
No Types Needed, Just Callable Method Check
dak2
1
460
名刺メーカーDevグループ 紹介資料
sansan33
PRO
0
1.1k
目的ファーストのハーネス設計 ~ハーネスの変更容易性を高めるための優先順位~
gotalab555
8
2k
AWS DevOps Agentはチームメイトになれるのか?/ Can AWS DevOps Agent become a teammate
kinunori
6
680
Introduction to Sansan for Engineers / エンジニア向け会社紹介
sansan33
PRO
6
74k
Azure Static Web Apps の自動ビルドがタイムアウトしやすくなった状況に対応した件/global-azure2026
thara0402
0
370
レビューしきれない?それは「全て人力でのレビュー」だからではないでしょうか
amixedcolor
0
300
Do Ruby::Box dream of Modular Monolith?
joker1007
1
320
[最強DB講義]推薦システム | 基礎編
recsyslab
PRO
1
160
Featured
See All Featured
Utilizing Notion as your number one productivity tool
mfonobong
4
290
職位にかかわらず全員がリーダーシップを発揮するチーム作り / Building a team where everyone can demonstrate leadership regardless of position
madoxten
62
53k
The agentic SEO stack - context over prompts
schlessera
0
740
Primal Persuasion: How to Engage the Brain for Learning That Lasts
tmiket
0
320
RailsConf & Balkan Ruby 2019: The Past, Present, and Future of Rails at GitHub
eileencodes
141
35k
Leading Effective Engineering Teams in the AI Era
addyosmani
9
1.9k
Designing for humans not robots
tammielis
254
26k
HDC tutorial
michielstock
2
620
I Don’t Have Time: Getting Over the Fear to Launch Your Podcast
jcasabona
34
2.7k
Joys of Absence: A Defence of Solitary Play
codingconduct
1
350
The Hidden Cost of Media on the Web [PixelPalooza 2025]
tammyeverts
2
270
Evolving SEO for Evolving Search Engines
ryanjones
0
180
Transcript
Thinking Like an Attacker (Hacking Your Own Organisation)
# whoami • Nick Le Mouton (@noodlesnz) • CTO Drugs.com
• Developer • Security • Operations
None
None
None
Googlebot
A2:2017 Broken Authentication
None
• Disconnect between security and developers • Security find vulnerabilities
• Developers fix vulnerabilities • Security often don’t impart how they found the vulnerabilities in the first place
• Best position to attack an application • Shift Mindset
• Logic and knowledge
None
None
Object Injection Example • A8:2017 Insecure Deserialization
None
None
GuzzleHttp\Cookie\CookieJar
Payload
None
None
Blind XSS • A7:2017-Cross-Site Scripting (XSS) • Security scan shows
no XSS vulnerability
XSS Hunter
So How Can I Do That? • Offensive Security Courses
• Hack Yourself First by Troy Hunt (pluralsight.com) • https://infosec101.nz/
• Start hacking things, find out what works and what
doesn’t • Damn Vulnerable Web Application (DVWA) • OWASP Juice Shop Project
CTFs • CTFLearn.com • Find upcoming online CTFs on ctftime.org
• Read write ups at ctftime.org/writeups
Thank You