NDC Oslo 2015 Hack Yourself First workshop26 Jun 2015
This year I had to pleasure to go to the NDC Oslo conference. I attended the two day preconference workshop 'Hack Yourself First' by Troy Hunt which I'll give a short overview of in this post. For the rest of the conference stay tuned for another post (or two).
Troy Hunt is a well known security expert and also a Pluralsight author. To support the workshop and the associated training course Hack Yourself First: How to go on the Cyber-Offense, Troy hosts a site at Hack Yourself First which is full of sloppy security practices. The setup of the workshop was to first cover a subject (theory) and then do an exercise to exploit the vulnerability that was just explained. In the remainder of this post I will shortly list the subjects that were covered and refer you to Pluralsight courses for more information on the threats /vulnerabilities and how to deal with them. I'd like point out that for me the hands-on hacking was what made these two days very valuable as that really made the security risks real and not just something mentioned in a report by an auditing firm.
- SQL Injection (Error Based, Union Based, Blind Boolean based, Blind Time based): This vulnerability is one that many people are aware of but somehow is still number 1 in OWASP Top 10 list.
- Cross-Site Request Forgery (CSRF)
- Content Security Policy (CSP)
- HTTP Strict Transport Security (HSTS)
- Brute-Force Attacks: How to counter these and how this interacts with usability
- Account Enumeration: Expose who your systems users are. Could not be a issue at all, but if you're adultfriendfinder.com it might be a bigger issue.
- HTTP vs. HTTPS: HTTP is very vulnerable to Man In The Middle (MITM) attacks. That's why Chrome will soon start marking pages served over HTTP as unsafe. Using his Pineapple Troy easily launched a MITM attack on a number of devices that automatically connected to the local WiFi.
- Cookies: Plain, HttpOnly and Secure
- FiddlerScript: Fiddler is great tool to monitor and change traffic between systems. FiddlerScript amongst others allows you to script traffic as it is flowing through the system.
- Automating: Doing this by hand is tedious and most importantly slow, so of course automated tools have been created. E.g. we used sqlmap to expose some SQL injection vulnerabilities in the Hack Yourself First site.
- Hack Yourself First: How to go on the Cyber-Offense by Troy Hunt
- Ethical Hacking: SQL Injection by Troy Hunt
- Web Security and the OWASP Top 10: The Big Picture by Troy Hunt
- OWASP Top 10 Web Application Security Risks for ASP.NET by Troy Hunt
NDC Oslo Videos
- Making Hacking Child’s Play by Troy Hunt (sadly the video upload was not succesful)
- 50 Shades of AppSec by Troy Hunt
- .Net Rocks Panel on Application Security with Andre Klingsheim, Barry Dorrans, Troy Hunt, Niall Merrigan, Carl Franklin and Richard Campbell