Hey there,

I hope you’ve been doing well!

A Taxing Season

Alright, I’m going to rant for a second, apologies.

Every tax season I get quite frustrated. I don’t mind paying taxes, the government does a lot of important things, like public education and ensuring most food doesn’t poison you.

What frustrates me is how complicated it is.

It’s like a freshman undergrad who has only done Matlab before was tasked to write a system in Perl, and then now everyone has to use it.

Clean encapsulation? LOL, this API returns UTF-7 unstructured text in a single blob, and every rand(100) calls returns a slap in the face.

Tech, for all of its (many) flaws, does so much better at abstractions. You can search all of the world’s information in a fraction of a second, from a device that fits in your pocket, using only your voice.

Proposal: all lawmakers and companies benefitting from tax code complexity from here on out can’t use DNS, they have to use direct IPs. And type out each HTTP request by hand. And manually chunk those HTTP requests into sizes that fit into TCP packets, correctly numbering each packet.

Then maybe they’d feel what it’s like when you push accidental complexity onto users 😤 </end_rant>

Rambo After Tax Season

🔥 Semgrep Community Meetup Next Wednesday

Want to hear about the latest and greatest in Semgrep?

Then come check out our community meetup next week.

Agenda:

  • I’ll be speaking about some current trends in security.
  • Community members will share cool things they’ve been doing with Semgrep.
  • We’ll share some new features - capturing developer feedback and advanced analysis features like taint mode.
  • A preview of Semgrep’s upcoming roadmap.

Check out the Eventbrite here.

Hope to see you there!

Sponsor

📢 Detect, investigate, and respond to threats across your applications, networks, and infrastructure

Datadog Security Monitoring is part of the Datadog Cloud Security Platform enabling DevOps and Security teams to collaborate together in a single pane of glass to protect an organization's production environment from outside security threats.

In Datadog's Security Monitoring product brief, learn the best practices for securing your environment from attacks. You will learn how to solve cloud complexity challenges with threat detection tools, detect and analyze security threats and deploy turnkey detection rules mapped to the MITRE ATT&CK framework.

Download the Security Monitoring Brief

📜 In this newsletter...

  • Conferences: RVAsec CFP is open
  • Supply Chain: 4 supply chain risks in Terraform and how to prevent them
  • AppSec: Reading RFCs for bug bounty hunters
  • GitHub: Finding and exploiting vulnerable GitHub Actions, auditing GitHub (Actions) security using OpenSSF Scorecards
  • Mobile Security: Hardening Signal, applying zero trust to enterprise mobile security
  • Web Security: Cross-platform web fuzzer, infosec mind maps
  • Cloud Security: Automating IR in AWS, centrally managed identity for AWS
  • Container Security: Updated Kubernetes hardening guide from NSA and CISA
  • Blue Team: Autogenerate pseudo-malicious files from YARA, IR-related macOS tools, manage servers via a non-interactive local host agent
  • Network Security: Tool that uses eBPF to monitor egress traffic
  • Misc: Hacking a billionnaire, Avenue Q puppet wrangling, mobile app to identify birds, guess a country based on their exports, Netflix's most popular shows, why we listen to music with lyrics we don't understand, advertisers want to infiltrate your dreams

Conferences

RVAsec 2022
A Richmond, VA-based security conference whose CFP is open until March 31st. If you have an idea in mind, feel free to email [email protected] for feedback.

Supply Chain

4 supply chain risks in Terraform and how to prevent them with Checkov
By Barak Schoster.

  1. Leaking secrets using Terraform HTTP data blocks
  2. Arbitrary code execution using a Terraform external data source
  3. Not using immutable modules
  4. Using old versions of misconfigured modules

AppSec

Reading RFCs for bug bounty hunters
Great post by EdOverflow.

  • Check out the “Security Considerations” section.
  • Review outdated RFCs (“Obsoleted by:” link).
  • Use Rfcdiff to diff outdated RFCs.
  • Review “Errata” for potential implementation mistakes.

GitHub

How we found vulnerabilities in GitHub Actions CI/CD pipelines
Cycode’s Alex Ilgayev describes vulnerable patterns in GitHub Actions that can lead to an attacker being able to steal secrets, inject code, etc., as well as mitigations. The post has some great details on exploiting these weaknesses in practice.

For more on how/why these vulnerabilities occur and how to find them, see Grayson Hardaway’s blog post here, which also includes a demo repo to practice on and open source Semgrep rules to find these issues in your GitHub Actions.

Automagically Auditing GitHub (Actions) Security using OpenSSF Scorecards
Jamie Tanna walks through setting up the OpenSSF’s Scorecard GitHub Action and the common GitHub repo settings and GitHub Action security issues you may see it raise.

Mobile Security

Hardening Signal
Short guide on settings and practices to harden your use of Signal, which is in my opinion the best privacy-focused messaging app.

Applying Zero Trust Principles to Enterprise Mobility
~20 page PDF by CISA on mobile security tools and technologies in relation to Zero Trust principles.

Cisa Enterprise Mobile Security Components Zero Trust

Web Security

d4rckh/vaf
A cross-platform web fuzzer written in Nim by @d4rckh. Custom wordlists, fuzz any part of the URL as well as POST data, and more.

Cyber-Guy1/API-SecurityEmpire
Infosec mind maps by Momen Eldawakhly and Lucas Lundgren covering recon on APIs, attacking RESTful and SOAP APIs, and attacking GraphQL.

Cloud Security

awslabs/aws-automated-incident-response-and-forensics
A framework that aims to facilitate automated steps for incident response and forensics based on the AWS Incident Response White Paper.

Tag an EC2 instance with a SecurityIncidentStatus value of Analyze, and a Lambda will trigger that automatically starts isolation and memory/disk acquisition, and ends with giving the instance a no INBOUND/OUTBOUND security group and with an IAM role that disallows all access.

Centrally Managed Identity for AWS
Carta’s Uttej Badwane describes how they migrated from a handful of legacy AWS accounts to moving them under a newly created master AWS account which was configured to use AWS SSO <=> Okta for identity, with SCIM configured. “The main objective was to handle the traditional IAM identity for multiple accounts with time based access for console & CLI.”

If you haven’t heard of SCIM, it’s basically a way to keep users in sync between your identity provider and many other systems (vs manually onboarding/offboarding/updating). Pretty cool.

Container Security

NSA, CISA release Kubernetes Hardening Guidance
Updated ~66 page technical report on recommendations to harden Kubernetes systems.

Primary actions include the scanning of containers and Pods for vulnerabilities or misconfigurations, running containers and Pods with the least privileges possible, and using network separation, firewalls, strong authentication, and log auditing.

Blue Team

claroty/arya
By Claroty: Given a YARA rule, Arya can generate pseudo-malicious files meant to trigger it. Useful for testing your detection sensors such as AV or EDR.

The Mitten Mac: Tools
Several neat macOS tools by Jamf’s Jaron Bradley:

  • TrueTree: an incident response tool for building a pstree like output on macOS.
  • ESFPlayground: a tool that lets you print out the events of the Apple Endpoint Security Framework as they happen in real time.

SansShell: A Non-Interactive Local Host Agent
Snowflake’s Aaron Joyner, Jon Allie, and James Chacon announce the release of SansShell, a way to define complex server management actions in code and selectively expose those actions to remote clients. Each action is subject to an authorization policy that can limit access based on the caller, the type of action, and the content of the request.

Sponsor

📢 Why Single Sign On Sucks

Discover why SSO is such a pain and how different authentication architectures make it hard to achieve a true single sign-on nirvana. At Teleport we think the secret lies with certificate authorities and client certificates -- a path towards a seamless SSO experience.

Learn more

Network Security

ancat/egrets
A proof of concept tool that uses eBPF, raw sockets, and kprobes to monitor egress traffic, by @ancat.

Misc

It Was Easy to Hack a Billionaire
SocialProof Security’s Rachel Tobac successfully socially engineers and phishes Jeffrey Katzenberg, co-founder and former CEO of Dreamworks Animation. For the technical details on the hack, see Evan Tobac’s thread. Jeffrey was… not pleased 🤣

Meet Avenue Q’s Puppet Wrangler
Some interesting behind the scenes. Man, what a good musical.

Merlin Bird ID
Mobile app to help you identify thousands of birds based on appearance or their song.

OEC Tradle
Guess a country based on their exports.

Tradle

These are Netflix’s Most Popular Shows (According to Netflix)

  • TV shows account for ~75% of viewing.
  • TV shows tend to stay in the top 10 a lot longer than movies.
  • The average Netflix hit disappears after two weeks or less.
  • Less than one-quarter of all shows stay in the top 10 for more than four weeks.

Netflix Longest Running Hits

Why We Listen to Music With Lyrics We Don’t Understand

“Elements of sound and music like pitch, melody, harmony, timbre, and amplitude have an affective, emotional, psychological, cognitive, and even physical impact on listeners.”

My version of another quote from the post:

Song Twitter frees the voice from any burden of saying anything meaningful.”

Are advertisers going to infiltrate our dreams?
Major brands like Coors, Microsoft and Burger King are researching how they can have you dream of their products. Cool, that seems like something they should be allowed to do. With so many smart devices in homes these days, it’s possible that sounds or messages could be played to you in your sleep without you even knowing it. It’s unclear how effective these approaches would be in practice though.

✉️ Wrapping Up

Have questions, comments, or feedback? Just reply directly, I'd love to hear from you.

If you find this newsletter useful and know other people who would too, I'd really appreciate if you'd forward it to them 🙏

Thanks for reading!

Cheers,
Clint
@clintgibler @tldrsec

Tags:

Updated: