Главная
Study mode:
on
1
Introduction
2
CI/CD Pipelines?
3
CI/CD: Command Execution as a Service
4
Methodology - Definition
5
IRL Issue: Perforce
6
IRL Issue: Network Storage
7
Methodology - Execution
8
Tooling - SSHReverse Shell
9
IRL Issue: Cross Instance Compromise
10
Methodology - Secret Management
11
IRL Issue: VMware guestinfo variables
12
Methodology - Reports
13
Tooling - Research Servers
14
IRL Issue: Web Hook - Classic DNS Rebinding
15
Methodology - Deployment
16
Summary
Description:
Explore the vulnerabilities in CI/CD pipelines and learn how to exploit them for profit in this 25-minute conference talk from the 44CON Information Security Conference. Dive into real-world issues involving Perforce, network storage, and cross-instance compromise. Discover methodologies for secret management, report manipulation, and deployment exploitation. Examine practical tools like SSH reverse shells and research servers. Analyze a classic DNS rebinding attack on web hooks. Gain valuable insights into attacking development pipelines and understand the potential risks and rewards associated with these security weaknesses.

Attacking Development Pipelines for Actual Profit

44CON Information Security Conference
Add to list