Главная
Study mode:
on
1
Intro
2
Open-source software is everywhere
3
Package Managers
4
Package Installation today - dependency hell
5
Software Supply Chain Attack
6
Attack Techniques: Typosquatting
7
Technique: Social Engineering
8
Technique: Dependency Confusion
9
Technique: Account Hijacking
10
How do we defend against these attacks?
11
Manual Vetting is infeasible
12
Vanity Stats are not enough
13
Packj: a dev-friendly vetting tool
14
Deep Metadata Analysis
15
Rigorous API Analysis
16
Runtime Analysis
17
Remote Code Execution Attack
18
Dependency Confusion Attack - Feb 2021
19
Colors and Faker Attack - Jan 2022
Description:
Explore the world of software supply chain attacks and learn how to defend against them in this 42-minute conference talk from nullcon. Dive into the sophisticated techniques used by bad actors, such as typo-squatting, repo-jacking, and social engineering, to infiltrate open-source package managers like NPM and PyPI. Discover PACKJ, a data-driven security analysis framework designed to measure and control potential supply chain risks when adopting open-source packages. Learn about the framework's use of static code analysis, dynamic tracing, and metadata checks to detect risky attributes in packages. Gain insights into various attack techniques, including dependency confusion and account hijacking, and understand why manual vetting and vanity stats are insufficient for package security. See a demonstration of the PACKJ tool in action, detecting risky packages and mitigating supply chain attacks, and explore real-world examples like the Colors and Faker attack from January 2022.

Unearthing Malicious and Risky OpenSource Packages Using Packj

nullcon
Add to list
0:00 / 0:00