I hope you’ve been doing well!
No tl;dr sec next week 🦃
I’m taking a week off. I hope you eat some good food and enjoy time with loved ones!
And please don’t publish too much great security work next week, so I can relax 😅
There are few things in life that give me as much joy as finding something new that is #PeakBayArea.
Like a vegan butcher shop in Berkeley, or goat yoga.
So you can imagine my delight when I discovered that a musical was made about burners vs the nouveau riche technocrats coming in to privatize Burning Man. Which was… created by a Google employee.
I saw a local showing last Saturday, and I’ve got to say: I thought it was excellent!
The writing was funny, the acting was good (legit people from Broadway!), and there were plenty of inside baseball tech jokes. It also has some quite catchy songs, for example, about a Stanford grad wanting to pitch his autonomous vehicle start-up to investors, to praying to the demo gods, welcome to the polyamory camp, and more.
When times get me down,
When I’m about to drown,
I look at the wall, to the tech gods
You can check it out for free on Amazon Prime, or other streaming sites.
Awesome work, Matt Werner and team!
📢 Randori discovers CVE-2021-3064, 0-Day in Palo Alto Networks
A CVSS 9.8 Critical vulnerability has been discovered and disclosed by Randori’s Attack Team that affects Palo Alto Networks (PAN) firewalls using the GlobalProtect Portal VPN (CVE-2021-3064). The vulnerability allows for unauthenticated remote code execution on vulnerable installations of the product, and should be treated seriously given the real world impact.
Join Randori on Dec. 14 for a webinar where we will go into a deep dive about the Palo Alto vulnerability as well as answer questions about disclosure.Sign up
📜 In this newsletter...
- AppSec: How to avoid leaking your customer's source code with GitHub apps, tools to cloen many GitHub repos, from what to how in cybersecurity
- Cloud Security: No need for IAM users when we have Yubikeys, don't use AWS CloudFormation, AfterPay's Cloud Cover IAM tool
- Container Security: Scanning millions of Docker containers, new entry level Kubernetes cert, detection engineering for k8s clusters
- Fuzzing: Network fuzzing with incremental snapshots, fuzzing DRAM to discover rowhammer vulns
- Supply Chain: SupplyChainSecurityCon recordings, GitHub App to enforce Developer Certificate of Origin, collection of supply chain resources
- Blue Team: Practical security recommendations for start-ups with limited budgets, CISA's incident and vulnerability response playbooks
- SSH: Harden your SSH config, tool to audit an SSH server or client, and an example SSH config file with modern defaults
- Red Team: Living Off Trusted Sites
- Misc: Estimating legal costs from a data breach, useful skills to learn as a web developer, see when a word was first used in print
How to avoid leaking your customer’s source code with GitHub apps
Roadie’s Brian Fletcher describes six ways to authenticate with GitHub APIs and their appropriateness for frontend vs backend code, and then some potentially dangerous subtleties. Brian outlines a vulnerability they found and reported in a handful of major SaaS products, which would have allowed us to access other GitHub organizations.
From What to How in Cybersecurity: Self Care, Culture, and Strategy
Great BSidesRDU 2021 keynote by former Netflix VP of Security Jason Chan on self care, security being an infinite game, making strategic bets, and more. I highly recommend watching, it’s now on my (evergrowing 😅) list of talks to summarize.
…from John May’s blogpost “… we are betting on developing easy-to-use, secure-by-default design patterns for our engineers to use versus putting resources into extensive security reviews.”
Dissolve, don’t solve!
With the right engineering investments made in “secure building blocks”, everyone can go fast! Security and velocity don’t have to be zero-sum games.
Instead of “solving” for better SLAs for security reviews, they dissolved the problem. Keeps your developers focused on building great products rather than worrying about security!
“No need for IAM users when we have Yubikeys.” Tool by Aidan Steele that uses the “card authentication” slot on a Yubikey to store a TLS certificate and private key. See Aidan’s thread on why there’s no need for AWS IAM users today.
Do not use AWS CloudFormation
Greg Swallow argues that CloudFormation is strictly worse than Terraform: it has extra indirection and is harder to debug, Terraform has a rich set of data sources and makes transforming data is a breeze, Terraform is much faster, CloudFormation’s async nature requires polling logic, Terraform is portable across providers, and more.
Well, That Escalated Quickly
AfterPay’s Dorien Koelemeijer describes Cloud Cover, a tool they built to enable developers to move quickly but also with least IAM privilege, using Okta, permissions defined in a git repo, and more. Neat approach.
- Netflix: ConsoleMe: A Central Control Plane for AWS Permissions and Access
- FollowAnalytics: Achieving least-privilege with Repokid, Aardvark and ConsoleMe
- Segment: Secure access to 100 AWS accounts.
Scanning Millions of Publicly Exposed Docker Containers
RedHunt Labs scanned over 6 million unique public repos on Docker Hub and found:
- 6/10 of the top base images were built more than a year ago. Thus, any vulnerability that got patched since then won’t be in the base image.
- The most common secret type was username/password to clone git repos.
- Top 5 exposures in Docker images: hard-coded secrets, copying sensitive config
files to the Docker image, adding the entire
gitrepo, including paid/proprietary software licenses, setting default credentials for apps.
Entry Level Kubernetes Certification to Help Advance Cloud Careers
New certification exam from CNCF and The Linux Foundation will test basic knowledge of Kubernetes and cloud native architectures.
Detection Engineering for Kubernetes clusters
NCC Group’s Ben Lister and Kane Ryans discuss the novel detection rules they have created around how privilege escalation is achieved within a Kubernetes cluster, to better enable security operations teams to monitor security-related events on Kubernetes clusters and defend them in real-world use.
The other concept that is useful when approaching detection engineering is “knowing where we can win”. This is the idea that for any given environment/system/technology there will be areas where defenders have a natural advantage. This may be because the logging is better, the attacker is forced into doing something, or there is a limited number of options for an attacker.
Nyx-Net: Network Fuzzing with Incremental Snapshots
A fast full-VM snapshot fuzzer for complex network based targets, by Sergej Schumilo and Cornelius Aschermann. Nyx-Net can fuzz a wide range of targets spanning servers, clients, games, and even Firefox’s IPC interface. It’s built upon kAFL, Redqueen and Nyx. The source code has been released, academic paper with more details here, and see this fuzzer speed run Super Mario here.
BLACKSMITH: Scalable Rowhammering in the Frequency Domain
H/T Marcel Böhme: “Fuzzing DRAM to discover rowhammer vulns. Works on 100% of today’s PC-DDR4 devices they tested, even when the Target Row Refresh (TRR) mitigation was enabled.” IEEE S&P 2022 paper.
SupplyChainSecurityCon - Talk Recordings Now Available
By the Continuous Delivery Foundation (CDF). Talks covering SBOMs, digital signatures, SLSA, getting started with supply chain security, and more.
By Probot: A GitHub App that enforces the Developer Certificate of Origin (DCO) on Pull Requests, requiring all commit messages to contain the
Signed-off-by line with an email address that matches
the commit author.
Practical Security Recommendations for Start-ups with Limited Budgets
By Alex Chapman: use a password manager and 2FA, develop with modern frameworks, configure an edge security service, enable HTTP security headers, apply security patches, backup user data and source code, centralize all logging, have a bug bounty program, service containerization, and deploy canary tokens.
Cybersecurity Incident & Vulnerability Response Playbooks
By CISA. Includes an incident response (preparation) checklist in the appendices.
LOTS Project - Living Off Trusted Sites
By @mrd0x: Attackers are using popular legitimate domains when conducting phishing, C&C, exfiltration and downloading tools to evade detection. This list of websites allow attackers to use their domain or subdomain.
How to estimate legal costs from a data breach
Interesting overview by Ryan McGeehan, based on 150 data breach settlements he reviewed. Areas: disclosure complexity, multiple litigators, litigation probability, discovery costs, settlement costs, trial costs, regulation, and indemnification. H/T Ryan Naraine.
Merriam-Webster: Time Traveler
See when a word was first used in print.
✉️ Wrapping Up
Have questions, comments, or feedback? Just reply directly, I'd love to hear from you.
If you find this newsletter useful and know other people who would too, I'd really appreciate if you'd forward it to them 🙏
Thanks for reading!Cheers,