Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Thinking Like an Attacker
Search
Nick Le Mouton
February 05, 2018
Technology
0
100
Thinking Like an Attacker
Nick Le Mouton
February 05, 2018
Tweet
Share
Other Decks in Technology
See All in Technology
コスト削減から「セキュリティと利便性」を担うプラットフォームへ
sansantech
PRO
3
1.5k
Bedrock PolicyでAmazon Bedrock Guardrails利用を強制してみた
yuu551
0
230
CDK対応したAWS DevOps Agentを試そう_20260201
masakiokuda
1
290
OCI Database Management サービス詳細
oracle4engineer
PRO
1
7.4k
小さく始めるBCP ― 多プロダクト環境で始める最初の一歩
kekke_n
1
410
顧客の言葉を、そのまま信じない勇気
yamatai1212
1
350
Tebiki Engineering Team Deck
tebiki
0
24k
Sansan Engineering Unit 紹介資料
sansan33
PRO
1
3.8k
SREのプラクティスを用いた3領域同時 マネジメントへの挑戦 〜SRE・情シス・セキュリティを統合した チーム運営術〜
coconala_engineer
2
650
ZOZOにおけるAI活用の現在 ~開発組織全体での取り組みと試行錯誤~
zozotech
PRO
5
5.5k
会社紹介資料 / Sansan Company Profile
sansan33
PRO
15
400k
仕様書駆動AI開発の実践: Issue→Skill→PRテンプレで 再現性を作る
knishioka
2
660
Featured
See All Featured
Public Speaking Without Barfing On Your Shoes - THAT 2023
reverentgeek
1
310
Highjacked: Video Game Concept Design
rkendrick25
PRO
1
290
Darren the Foodie - Storyboard
khoart
PRO
2
2.4k
The Illustrated Children's Guide to Kubernetes
chrisshort
51
51k
Git: the NoSQL Database
bkeepers
PRO
432
66k
Ethics towards AI in product and experience design
skipperchong
2
190
RailsConf & Balkan Ruby 2019: The Past, Present, and Future of Rails at GitHub
eileencodes
141
34k
Lightning Talk: Beautiful Slides for Beginners
inesmontani
PRO
1
440
SEO Brein meetup: CTRL+C is not how to scale international SEO
lindahogenes
0
2.3k
HDC tutorial
michielstock
1
380
A brief & incomplete history of UX Design for the World Wide Web: 1989–2019
jct
1
300
Agile Actions for Facilitating Distributed Teams - ADO2019
mkilby
0
110
Transcript
Thinking Like an Attacker (Hacking Your Own Organisation)
# whoami • Nick Le Mouton (@noodlesnz) • CTO Drugs.com
• Developer • Security • Operations
None
None
None
Googlebot
A2:2017 Broken Authentication
None
• Disconnect between security and developers • Security find vulnerabilities
• Developers fix vulnerabilities • Security often don’t impart how they found the vulnerabilities in the first place
• Best position to attack an application • Shift Mindset
• Logic and knowledge
None
None
Object Injection Example • A8:2017 Insecure Deserialization
None
None
GuzzleHttp\Cookie\CookieJar
Payload
None
None
Blind XSS • A7:2017-Cross-Site Scripting (XSS) • Security scan shows
no XSS vulnerability
XSS Hunter
So How Can I Do That? • Offensive Security Courses
• Hack Yourself First by Troy Hunt (pluralsight.com) • https://infosec101.nz/
• Start hacking things, find out what works and what
doesn’t • Damn Vulnerable Web Application (DVWA) • OWASP Juice Shop Project
CTFs • CTFLearn.com • Find upcoming online CTFs on ctftime.org
• Read write ups at ctftime.org/writeups
Thank You