Главная
Study mode:
on
1
- BlitzProp HackTheBox Cyber Apocalypse CTF challenge Intro
2
- What is snyk?
3
- Snyk can be FREE!
4
- Connecting Snyk to Github
5
- Discovering Goof, the Vulnerable Web App
6
- Deploying Goof
7
- Interacting with Goof
8
- Finding Directory Traversal/File Access
9
- Snyk Vulnerability Database
10
- Patching Vulnerabilities with Snyk
11
- Pivoting back to the HackTheBox BlitzProp challenge
12
- Finding Prototype Pollution and RCE with Snyk
13
- Deploying the BlitzProp challenge with Docker
14
- Exploiting the Prototype Pollution vulnerability
15
- Using Snyk to Patch the Vulnerability
16
- Validating the change with our exploit
17
- Wrap Up & Thank You
Description:
Explore the power of Snyk in identifying and fixing vulnerabilities through a hands-on demonstration using the HackTheBox Cyber Apocalypse CTF challenge. Learn about Snyk's capabilities, including its free tier, and how to integrate it with GitHub. Discover and deploy Goof, a vulnerable web application, to practice finding security issues like directory traversal and file access. Dive into Snyk's vulnerability database and learn how to patch vulnerabilities effectively. Apply these skills to the BlitzProp challenge, focusing on prototype pollution and remote code execution. Follow along as the video guides you through deploying the challenge with Docker, exploiting the vulnerability, and using Snyk to patch it. Conclude by validating the fix and gaining valuable insights into practical application security.

Using Snyk to Find & Fix Vulnerabilities

John Hammond
Add to list
0:00 / 0:00