Attend In-person€2,299.00
Date | Day | Time | Duration |
17 Apr | Monday | 09:00 to 17:00 CEST/GMT+2 | 8 Hours |
18 Apr | Tuesday | 09:00 to 17:00 CEST/GMT+2 | 8 Hours |
This training is a deep hands-on, red-team exploration of application supply-chains. We commence with an understanding of application supply chains, and subsequently dive into story-driven scenarios of exploiting supply-chains like exploiting CI systems, build systems.Container infrastructure and cloud-native infrastructure hosted on Kubernetes, AWS and Azure.
People learn better with stories. Our exploit and lateral movement scenarios are intricately designed labs that are backed by real-world stories that help students understand this
subject-matter a lot better. This training was sold-out at Blackhat USA 2022 with a 4.8/5 Rating.
Application Dependencies – Stories and Hands-on Labs
This section of the class is where we do a couple of case studies (stories) on identifying vulnerabilities against Application Dependencies and compromising them. Once compromised, we’ll be looking at possibilities of post-exploitation and lateral movement against these dependencies. In these stories, we’ll be showcasing the following type of attacks and exploits:
○ Magecart-style and other JavaScript client-side attacks leading to user compromise, browser-hooking and so on
○ Attacking client-side supply chain elements by attacking private CDNs, static stores, etc.
○ Exploring additional client-side exploit possibilities with CSP Bypasses, etc.
○ Attacking CDN infrastructure like Cloudfront and S3 with CSP bypasses to perform client-side supply-chain exploits
○ Leveraging vulnerable components to perform application exploits and Lateral movement. This includes:
○ Typo-squatting flaws
○ Dependency Confusion attacks
○ Jenkins
○ Bamboo
○ GitHub Actions
○ GitLab CI
In this section we’ll be covering multiple attacks and exploit scenarios around attacking CI Services. These attacks specifically look at approaches where adversaries compromise the CI tools to be able to inject malicious code or otherwise taint the build process and environments of organizations. The case studies and stories that we’ll cover as part of this module include the following:
○ Cross build Injection attacks
Cloud-native environments are a massive source of supply-chain risk. With Infrastructure-as-Code, to Continuous Deployment Systems, to Cloud-native package management, there’s tremendous scope for attacking, exploiting and escalating privileges against cloud-native environments. In this section we’ll be looking at case studies and stories of supply chain security risks against Kubernetes and AWS environments as a reference point. Naturally, these will be replete with deep-dive hands-on labs that will walk you through the multi-step flaws and exploits against cloud-native supply chains
○ AWS
○ Azure
○ Cloud
○ Kubernetes & Microservices
○ Common attack patterns
○ Understanding layers
RT @HITBMedia: Call for Papers for #HITB2023AMS closes next Tuesday, 31st Jan @ 23:59 CET - Got something cool you'd like to present? Send…
Read MoreCall for Papers for #HITB2023AMS closes next Tuesday, 31st Jan @ 23:59 CET - Got something cool you'd like to present? Send it in! #CFP #CallForPapers #SecurityConference #CyberSecurity #InfoSec #Hackers #0day
Read MoreRT @HITBMedia: The deadline for submitting talk proposals for #HITB2023AMS is fast approaching (31 Jan). Share your expertise and insights…
Read MoreRT @HITBMedia: Don't miss the deadline! Submit your talk proposals for #HITB2023AMS by January 31st. Have unique insights on defensive secu…
Read More