Главная
Study mode:
on
1
Intro
2
Open-source Supply Chain Attacks
3
Repo Jacking
4
Vulnerable Scenarios
5
Repository Redirects
6
GitHub's Response
7
Mass Analysis
8
Data Collection
9
Clean Up
10
Hijackable Usernames
11
Dependency Analysis
12
4. Directly Vulnerable Projects
13
Key Findings
14
Remediations
Description:
Explore a critical security vulnerability affecting over 70,000 open-source projects in this 25-minute conference talk from NorthSec 2021. Dive into 'repo jacking', an obscure supply chain vulnerability that allows attackers to hijack Github repositories and achieve remote code execution through dependency injection. Learn about the vulnerability's causes, exploitation methods, and why it has gone unnoticed for so long. Discover how to scan open-source projects for this vulnerability, build dependency graphs, and understand its full impact. Examine the prevalence of repo jacking across various project types, from small personal games to large web frameworks and cryptocurrency wallets. Gain insights into mitigation strategies to protect your projects from this and other supply chain attacks.

Repo Jacking - How Github Usernames Expose Projects to RCE

NorthSec
Add to list
0:00 / 0:00