Hey there,
I hope youāve been doing well!
Presenting at BSidesSF Virtual
BSidesSF 2021 is virtual this year, and theyāve decided to restream some of their favorite talks from past years.
Iām honored to say that my āHow to 10X Your Securityā (slides) is one of them!
Check out the schedule, there are a bunch of great talks š
And if you want to
flame me have a civil discussion on the Internetz, Iāll be answering
questions on r/BSidesSF this Sunday, March
7th at 1:40pm.
Sponsor
š¢ Calling all DevSecOps nerds
Are you excited by DevSecOps, shifting left, security automation, and all things cloud? Do you want to focus on original research, helping the most ambitious organizations on the planet to turbo-charge their AppSec programmes? You already know PortSwigger from Burp Suite. Our world-class research team is now looking for someone like you.
Find out moreItās no secret that Iām a big fan of Portswiggerāļø Dafydd Stuttard bootstrapped the company with no external funding, theyāve built the standard web app pen testing tool, their Academy has awesome free web security training, and they churn out world-class security research, every year.
In my opinion, they really knocked it out of the park with this job description. Probably one of the best Iāve seen *chefās kiss*. Also, I just discovered their culture doc, which is super compelling as well š
If youāre into cloud security and doing research, you should check this out. But not in front of your boss, I donāt want them to be mad at me.
š In this newsletter...
š Links:- AppSec: How to do security team engineering embeds well, tool for testing SSO interfaces, Dependency-Check GitHub Action, resources for getting into bug bounty
- JSON Woes: Study showing that different JSON libraries parse differently, suggestions for mitigating these risks
- Cloud Security: Assume AWS IAM roles from GitHub Actions workflows with no stored secrets, Journey parody about AWS
- Container Security: ATT&CK for containers
- Blue Team: Tool for orchestrating Security Operations and providing Threat Intelligence feeds
- Red Team: Tool for collaborative reverse engineering with multiple tools
- Politics / Privacy: Firefox Total Cookie Protection mode, engage š¤
- Career Advice: Panel on getting your security dream job, mind map of cybersecurity domains, soft yes and fast quit, directions and advice on what you should do with your life
- Twitter: Your threat model is not my threat model, hospital edition
- In defense of blub studies: How to become compoundingly more effective
AppSec
š„ Shifting Engineering Right: What security engineers can learn from DevSecOps
This post by Segmentās Leif Dreizler is one
of the best posts Iāve read on how AppSec/ProdSec teams can integrate with
engineering teams, both big picture perspective as well as tactical tips for
security professionals embedding in dev teams successfully. Highly recommend.
RandoriDev/test-saml-idp
Tool by Randoriās Eric McIntyre: a
simple SAML Identity Provider (IdP) for testing SSO interfaces. It can produce
various malformed responses to determine if the service exhibits unexpected or
unexpected behaviors.
dependency-check/Dependency-Check_Action
Run OWASP Dependency-Check as a GitHub Action, by Javier Dominguez.
nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters
A list of resources for those interested in getting started in bug bounties, by
Ben Sadeghipour.
JSON Woes
An Exploration of JSON Interoperability Vulnerabilities
JSON is widely used, but due to varying specs and implementations, different
languages and libraries parse JSON differently. Bishop Foxās Jake
Miller surveyed 49 JSON parsers and catalogued
their quirks, and presents a variety of attack scenarios and Docker Compose labs
to highlight the risks.
I like the thoroughness and methodology of this post. If youāre looking to do a
nice ecosystem-level study, give this a read as a good example.
Best Practices to Mitigate JSON Interoperability Vulnerabilities
Claudio Salazarās post walks through several of
Jakeās labs and discusses how to mitigate the respective bugs. You could use
JSON Schema to validate user input, but that seems to allow attributes not
declared in your schema by default. Instead, Claudio recommends a data
validation library like
marshmallow.
Cloud Security
glassechidna/actions2aws
By Aidan Steele:
āAssume AWS IAM roles from GitHub Actions workflows with no stored secrets.ā AWS
recommends creating an IAM user with a long-lived access key and storing those
credentials as GitHub secrets. This repo is a GitHub action that can grant your
workflows access to AWS via an AWS IAM role session, thus you donāt need to
store long-lived credentials in GitHub. The role sessions are even tagged with
repo, SHA, run numbers, etc. for saner CloudTrail trawling.
Donāt Stop Releasinā by Billie Perry
Want to indulge your 80s nostalgia and combine it with some cloud-related snark? Well this Journey parody is the video for you š Also, who knew Corey Quinn could hit those high notes?!
Container Security
Update: Help Shape ATT&CK for Containers
MITREās Jen Burns provides updates on ATT&CK for
containers, including new entries in Execution, Privilege Escalation, Defense
Evasion, Credential Access, and Discovery.

Blue Team
PatrowlHears - Vulnerability Intelligence Center
By PatrOwl: A āfree and open-source solutions
for orchestrating Security Operations and providing Threat Intelligence feeds.ā
Users have access to a comprehensive and continuously updated vulnerability
database scored and enriched with exploit and threat news information.


Red Team
Martyx00/CollaRE
A tool for collaborative reverse engineering that aims to allow teams that do
need to use more then one tool during a project to collaborate without the need
to share the files on a separate locations. Supports Binary Ninja, Cutter
(Rizin), Ghidra, Hopper Dissassembler, IDA and JEB.
Politics / Privacy
Firefox 86 Introduces Total Cookie Protection
Total Cookie Protection confines cookies to the site where they were created (by
maintaining a separate ācookie jarā for each website you visit), which prevents
tracking companies from using these cookies to track your browsing from site to
site.
Career Advice
Get your security dream job
Joint event by OWASP Bay Area and OWASP Vancouver:
- Types of jobs in security (Farshad Abasi, Chief Security Officer ā Forward Security)
- How to land security interviews (Tom Alcock, Founder ā Code Red Partners)
- How to ace a culture interview (Walta Nemariam, Senior Technical Recruiter ā Netflix)
- Interviewing for management/leadership roles (Coleen Coolidge, CISO ā Segment)
- What to do when you have a new job (John Menerick, Information Security Officer ā Plastiq)
- How to do security work in your current role (Divya Dwarakanath, Engineering Manager ā Snap)
- How to ace a technical interview (Pavan Kolachoor, Staff Security Engineer ā Databricks)
The Map of Cybersecurity Domains (version 2.0)
One thing I found challenging when I was initially considering pursuing security
as a career is knowing even what sort of opportunities are out there. Henry
Jiang created a great mind
map that gives some useful perspective.

āHell Yes, or Noā vs. āSoft Yes, and Fast Quitā
Good career advice by Phil Venables.
Try a bunch of things, as you often donāt know what will be a āHell Yesā before
you do it. Then, double down on the things that are and gracefully step back
from things that arenāt. Many of the connections and knowledge you gain from the
things you stopped will still be valuable later.
What Should You Do with Your Life? Directions and Advice
Lots of useful links and byte-sized snippets in this great post by Alexey
Guzey. H/T to my friend David
Nichols for sharing. Topics
include:
- What to work on?
- How to actually work on the problem you like?
- Cold emails and twitter
- Where to find funding to work on any of these problems?
Your threat model is not my threat model, hospital edition pic.twitter.com/YHvZGCkWcs
— Nik (@hvcco) February 23, 2021
In defense of blub studies
Ben Kuhn argues that to become a better programmer, rather than learning an obscure programming language or reading a textbook on something like ML, instead go āreally deep on what you already know: your main programming language, web framework, object-relational mapper, UI library, version control system, database, Unix tools, etc. ā
If you spend half your programming time debugging, and being a blub expert lets you debug twice as fast, then just the speed gain from blub expertise will let you increase your output by a third.
If you know enough different blubs, you can end up at the point where you donāt even need to look things up to figure out how theyāre (probably) implemented. An experienced Python programmer can guess immediately how SQLAlchemyās ādeclarativeā ORM works under the hood. Thatās the point when your blub expertise will really start compoundingāalmost as soon as you start working with something new, youāll start figuring out how it works and extracting the kernel of generally-interesting ideas.
How to get started?
First, Iāll try to go deeper than necessary. If I really want to ship something, itās easy to give into temptation to, say, Google an error message, copy-paste a fix from Stack Overflow, and move on with my day. But it often doesnāt take that much longer to actually read the error message, understand what it means, and try to figure out why that Stack Overflow answer fixed my problem. Similarly, if Iām stuck in a tricky yak shave, Iāll bias against āguess-and-checkā style debugging in favor of getting a better understanding of the system Iām trying to debug.
The second part of my blub flywheel is to pay attention to magic. Whenever Iām working with something new, I try to continuously update my best-guess mental model of how itās implemented. If I realize Iām wrong, Iāll dig in and update. If I have no idea at all how something could work, that usually means itās time to read a book.
Over time, by consistently exploring the guts of anything Iām working with that seems magical, Iāve built up a broad base of knowledge about how various technical systems work. This helps me in tons of different ways. It makes it easier to track down tricky bugs across many layers of the stack. I can learn new languages and libraries quickly by pattern-matching them to what I already know. It gives me better ideas for software designs, by imitating other systems Iāve seen, or by reusing ideas or tools Iāve heard of in a different context. Maybe most importantly, it gives me the confidence that, if I run into a tricky problem, I can learn enough to solve it, instead of feeling like Iām at the mercy of a system too complex to hope to understand.
So if youāre looking to learn something that will make you a better, and happier, programmer, ask yourself which parts of your most-used blub seem magical to you, and try to understand how they work.
āļø Wrapping Up
Have questions, comments, or feedback? Just reply directly, I'd love to hear from you.
If you find this newsletter useful and know other people who would too, I'd really appreciate if you'd forward it to them š
Thanks for reading!
Cheers,Clint
@clintgibler