Latest Web Vulnerability Trends & Best Practices – Patrick Vandenberg – ASW #245
Full Audio
View Show IndexSegments
1. Invicti AppSec Indicator: Latest Web Vulnerability Trends & Best Practices – Patrick Vandenberg – ASW #245
Without visibility and continuous monitoring, dangerous threats expose our blind spots and create risk. Invicti, who brought together Acunetix and Netsparker, analyzes common web application vulns across thousands of assets yearly and releases the Invicti AppSec Indicator for a holistic view of vulnerability trends from automated scan results. In this talk, Invicti Director of Product Patrick Vandenberg shares a deep dive into the trends currently impacting AppSec programs and discusses some of the best practices that will help organizations achieve efficiencies in their programs.
Segment Resources:
This segment is sponsored by Invicti. Visit securityweekly.com/invicti to learn more about them!
Announcements
Join us at an upcoming Official Cyber Security Summit in a city near you! This series of one-day, invitation-only, executive level conferences are designed to educate senior cyber professionals on the latest threat landscape.
We are pleased to offer our listeners $100 off admission when you use code SecWeek23 to register.
Visit securityweekly.com/cybersecuritysummit to learn more and register today!
Guest
A seasoned cybersecurity leader, Patrick Vandenberg is the Director of Product at Invicti Security. He works closely with security and DevSecOps stakeholders to understand today’s cybersecurity pain points so we can continue to help our customers solve their application security challenges. As an alumnus of several cybersecurity companies, including Hunters, Snyk, and IBM Security, Patrick brings over 20 years of experience in cybersecurity across product marketing and product management roles. Patrick holds a degree in Systems & Computer Engineering from Carleton University and, in his free time, continues a longtime passion for coaching and playing hockey.
Host
2. XSS in Azure, Choosing Web Research Topics, Security Dev-in-Residence, More Myths – ASW #245
Two XSS vulns via postMessage methods in Azure, how to choose (and move on from) a web research topic, OpenSSF finances a security developer-in-residence for Python, more infosec myths, free cybersecurity training resources
Announcements
We're always looking for great guests for all of the Security Weekly shows! Submit your suggestions by visiting https://securityweekly.com/guests and completing the form!
Hosts
- 1. Two XSS Vulnerabilities in Azure with Embedded postMessage IFrames
A wonderfully detailed writeup about being diligent in not only finding a flaw, but figuring out how to exploit it. This takes a deep dive into the postMessage() method, for which both that Mozilla documentation and the spec itself give warnings about the potential for XSS from hostile data.
Azure in fact had a lot of security recommendations in place, such as CSP and checking message origins against an allow list. But two endpoints were misconfigured, which the researchers took advantage of.
Another article noted a good practice in Microsoft's response, where they "updated their internal rules to improve scanning for this class of bug across all of Microsoft’s products and services."
- 2. GitHub Dataset Research Reveals Millions Potentially Vulnerable to RepoJacking
Taking over orphaned resources is a security issue for package management systems (including adjacent attacks like typosquatting), sub-domain hijacking, and GitHub repos aka repojacking. (Arguably, the concept is similar to taking over abandoned handles on social media sites or email addresses.)
This research focused more on the consequences and exploit scenarios of repojacking, noting that even large orgs with well-funded security programs had vulnerable repos. Probably the biggest thing to point out here is how difficult asset management is (to no one's surprise) and how complex it is in terms of types of assets (add repos and SaaS assets to the list).
- 3. How I choose a security research topic
Insights from James Kettle about how to approach security research in terms of challenging yourself, focusing on techniques for a broad audience, and maintaining a sense of curiosity.
- 4. PSF Welcomes New Security Developer in Residence with Support from Alpha-Omega
The OpenSSF’s Alpha-Omega Project "partners with open source software project maintainers to systematically find new, as-yet-undiscovered vulnerabilities in open source code – and get them fixed."
Through this program the Python Software Foundation (PSF) has hired its first security developer-in-residence. I like how this includes an explicit focus on fixing vulns as opposed to just another effort to scan for more flaws.
Read about how they see their responsibilities and keys to success in their blog. This might also provide some inspiration for orgs looking to start an appsec program, make their first security hire, or integrate security into their DevOps teams.
- 5. An Analyst View of Gartner Security & Risk Management Summit 2023
The four myths noted in this article stood out to me. They're perhaps empty platitudes that you already dismiss or are already suspicious of, but they're a decent way to make sure your risk strategy and approach to appsec has something more concrete to it than just buying more tools, shifting left, or adding more controls.
- 6. Free Training’s Role in Cybersecurity
This article links to a lot of free training and here on ASW we want to highlight free training. But there's a lot of free training out there. And it's important to be able to find training that will introduce you to key topics, help you learn tools, and reinforce techniques for finding or fixing flaws. After all, we need a lot more than just reading about top 10 lists.
The Web Security Academy from Portswigger isn't on the list in that article, but it's definitely one I'd recommend.
- 7. LEARN: Introducing Cloudfoxable: A Gamified Cloud Hacking Sandbox
- 8. LEARN: The Big IAM Challenge
We didn't have time to cover this last episode, so we're putting it back on the list for this one -- let's see if we manage to discuss it this time!
- 1. One pentester’s AWS pentest methodology
While we talk about cloud vulns and security issues, I don't think we've talked through how one tests their cloud environment. What's different than a "normal" pentest? Here's one testers methodology about looking for cloud-specific issues.
- 2. About a vulnerability found in AWS CDK
CDK - AWS' multi-language IAC framework - is open source, with quite a lot of eyes on it. Nonetheless, a vuln was found in part of the code for creating EKS clusters.
- 3. How to install Keycloak
I'm on a hands-on kick this week, it seems. Without offending sponsors, when new applications ask me what they should use for identity and access management, Keycloak is often what I recommend. Still, it's easy for me to say "just use Keycloak." Here's the first part in a series on how to set keycloak up for production use.
- 4. Why platforms with ineffective bounty programs pay a higher price
This article is crypto-focused, but still interesting to see that the less effective a bug bounty program is, the more the org ends up paying. Perhaps this is part of why bug bounties have a bad reputation in some circles...
- 5. Exploring The Anatomy Of A Linux Kernel Exploit
This is a neat writeup about looking for and finding a vulnerability in fresh kernel code. I share this under my ongoing trend of thinking about where and how to look for bugs in your code. (h/t hackaday)
- 6. Can a WASM compiler be non-standard
That's the viewpoint of the Bytecode Alliance about WASIX, a WASM compiler that compiles to Posix and other bytecodes, not needing a wasm runtime...