Hunter Henrichsen

Hunter Henrichsen

Search Circle
< lecture

Lecture 27 - Retrospective and Q&A

posted about 1 year ago 4 min read

Lecture 27 - Retrospective and Q&A#

Announcements#

News#

Extra Credit#

If you don’t want to arrange make-up credit by talking to me (or bonus participation), do an extra track on HackThisSite and I’ll throw in 3 points to an assignment where you have lost them. Steganography and Realistic are both interesting exercises to go through, but I’ll accept any of them.

Retrospective#

Let’s talk about what has gone well and what has not gone well so far this semester.

Our goal from this is to learn from each other, not to place the blame on people or technologies:

Regardless of what we discover, we understand and truly believe that everyone did the best job they could, given what they knew at the time, their skills and abilities, the resources available, and the situation at hand

– Norm Kerth, Project Retrospectives: A Handbook for Team Review, quoted in the Retrospective Wiki.

Security Addendum#

Here are some things that I think are worth touching on that we didn’t get to last time.

Supply Chain Attacks#

These are vulnerabilities introduced to upstream dependencies like npm dependencies. Some people get around these by pinning versions or vendoring packages. The recent xz vuln is an example of this. This is another example of a theoretical supply chain attack that I think about a lot.

Third Party Vulnerabilities#

A variant of Supply Chain Attacks, but ones that I attribute to incompetence and ignorance more than malice. Sometimes third parties, especially third party services that you use, or even customers, do insecure things. You should be careful of what third parties are allowed to do on your services and have a plan in place should one of them stop working.

Secrets Leaking#

Through a number of other things that could go wrong, sometimes your secrets get exposed to the public. You should have a plan in place (and perhaps practice) rotating your secrets.

Hack This Site#

Please go through the exercises on the site; they show you some of the many ways people can get to information on your app. I think the DEFCON talks are worth watching / listening to as well to learn about how things are breached. There are also security and exploit reports worth reading, and learning from other people’s mistakes.

Your Own Audits and Bug Bounties#

It’s definitely worth it to do something like we did last week on your own site – get together, try to find vulnerabilities, or just otherwise explore what information you can get access to.

You can also do bug bounties, and there are individuals out there who will look for vulnerabilities in your apps in exchange for a fee for each one they find.

Q&A#