Главная
Study mode:
on
1
Who am I
2
What is Shape
3
Event Stream
4
Why
5
Semantic Versioning
6
Note
7
Dependencies
8
What did it do first
9
How was it discovered
10
The payload
11
Recap
12
All the packages
13
Decrypting
14
Injection
15
Final payload
16
The bad news
Description:
Dive into a comprehensive analysis of the event-stream npm package exploit in this 25-minute conference talk from Amsterdam JSNation 2019. Explore how an attacker gained control of the package and leveraged it to target a specific mobile application. Uncover the three payloads of the attack, their purposes, obfuscation techniques, and ultimate goals. Learn about the importance of understanding such exploits for maintaining security in the npm ecosystem. Examine topics including semantic versioning, dependency management, payload discovery, decryption methods, and injection techniques. Gain valuable insights into the potential widespread nature of such attacks and the significance of staying vigilant in the face of evolving security threats in the JavaScript development landscape.

Analysis of an Exploited NPM Package

JavaScript Conferences by GitNation
Add to list
0:00 / 0:00