SlideShare a Scribd company logo
1 of 187
Join Us:
https://www.linkedin.com/company/
application-security-virtual-meetups
QR Link:
The Dark Side of AI: The Hidden
Risks in Open-Source AI Models
Jossef Harush Kadouri
Head of SCS
Checkmarx
@jossefharush
3
Agenda
• Software Supply Chain
• Attacks in Software Supply Chain
• Open Source AI Models
• AI Models Vulnerabilities
• Takeaways and Summary
4
2023 Checkmarx. All Rights reserved. 5
6
7
8
2023 Checkmarx. All Rights reserved. 9
2023 Checkmarx. All Rights reserved. 10
• Ducati trip
11
12
Fighting Supply Chain Attackers
My Team’s Mission:
Software Supply Chain
14
Software Supply Chain Risks
15
20
21
Attacks in Software Supply Chain
List of Popular Packages Gone Bad
• PyTorch
• ua-parser-js
• coa
• rc
• node-ipc
• colors, faker
• styled-components
• …
64
65
66
67
68
69
70
71
73
74
2023 Checkmarx. All Rights reserved. 75
2023 Checkmarx. All Rights reserved. 76
2023 Checkmarx. All Rights reserved. 77
78
Hiding Malicious Code In
Model
82
Pickle
• Built-in Python module
• Helps storing complex Python objects into binary files
• Used in many applications, specifically when saving and loading
machine learning models
84
import pickle
85
import pickle
data = {'a': 100, 'b': 200, 'c': 300, 'd': 400}
86
import pickle
data = {'a': 100, 'b': 200, 'c': 300, 'd': 400}
with open('data.pickle', 'wb') as f:
pickle.dump(data, f)
87
import pickle
with open('data.pickle', 'rb') as f:
data = pickle.load(f)
print(data)
{'a': 100, 'b': 200, 'c': 300, 'd': 400}
88
import pickle
class MyObject:
def __init__(self, name):
self.name = name
data = MyObject('test’)
with open('data.pickle', 'wb') as f:
pickle.dump(data, f)
Pickle is A Weak Format
• An attacker can execute arbitrary code during unpickling
89
90
import pickle
class MyObject:
def __init__(self, name):
self.name = name
def __reduce__(self):
return exec, ('print("hello from pickle")',)
data = MyObject('test’)
with open('data.pickle', 'wb') as f:
pickle.dump(data, f)
91
import pickle
with open('data.pickle', 'rb') as f:
data = pickle.load(f)
print(data)
hello from pickle
None
92
80%+ of HuggingFace models use insecure format
*stats from 2023
Creating a malicious model
93
97
Model Poisoning
103
Clone
legitimate
model
Train
model to
suggest
malicious
code
New
model
produce
malicious
code
Model
with data
poisoning
How the training looks like
105
106
107
2023 Checkmarx. All Rights reserved. 109
2023 Checkmarx. All Rights reserved. 110
2023 Checkmarx. All Rights reserved. 111
2023 Checkmarx. All Rights reserved. 112
2023 Checkmarx. All Rights reserved. 113
2023 Checkmarx. All Rights reserved. 114
Takeaways
Picklescan
• Command-line tool
• Python Pickle Malware Scanner
• Open source, MIT License
SafeTensors
• Better and secure format
117
Overlay
• Browser extension to help evaluate open source packages
• Data Sources: Snyk Advisor, Debricked, Socket.dev, Deps.dev.
• Metrics:
• Popularity, quality, security, maintenance, compatibility.
• Detailed Info:
• License, dependencies, vulnerabilities, issues, releases, etc.
• Open source, Apache 2.0 License
Takeaways
• Reduce the excessive trust in open source
• Vet your open source
• Avoid pickle models, use SafeTensors models
medium.com/
checkmarx-security
Thank You
https://github.com/os-scar/overlay
https://github.com/jossef/malicious-ai-demos
https://medium.com/checkmarx-security
Fighting Supply Chain Attackers
My Team’s Mission:
PAGE
Amit German
Pentera Research Group
130
WebLogic - A Road to
Post Exploitation
PAGE
131
Agenda
● Whoami
● Motivation
● What is WebLogic?
● Why WebLogic?
● CVE-2020-14883 + CVE-2020-14882
● Post-Exploitation (and a lot of it)
● Mitigations
● Summary
PAGE
Whoami
● Amit German, 25
○ 🇮🇱 Living in Israel 🇮🇱
○ Working @ Pentera as an Offensive Security Researcher
● Originally a Blue Teamer
132
PAGE
Relevancy
133
PAGE
Motivation (An over over simplification)
134
Database Backend Frontend
(Website)
PAGE
What is WebLogic?
● An enterprise-level application server developed by Oracle
● Based on Java Enterprise Edition (Java EE)
● Operates as a middleware – a bridge between Backend and Frontend
○ Capable of hosting multiple applications
○ Supports database connections
135
● Nightmare to update :)
PAGE
What is WebLogic?
● An enterprise-level application server developed by Oracle
● Based on Java Enterprise Edition (Java EE)
● Operates as a middleware – a bridge between Backend and Frontend
○ Capable of hosting multiple applications
○ Supports database connections
136
● Nightmare to update :)
PAGE
Why WebLogic?
137
Database Backend Frontend
(Website)
PAGE
Why WebLogic?
138
PAGE
Why WebLogic?
139
PAGE
140
Why WebLogic?
PAGE
Time to take a look!
• The the world of WebLogic!
141
PAGE
What now?
● Goals
● Remote Code Execution (RCE) on the WebLogic Server
● Collect useful data
● Deploy a backdoor
● Requirements
○ Authentication Bypass
○ Remote Code Execution (RCE)
○ CVE-2020-14883 + CVE-2020-14882
143
! There are 274 known vulnerabilities
!
PAGE
CVE-2020-14883
● Authentication bypass
● Super easy to execute
● console/css/%252e%252e%252fconsole.portal
144
../
PAGE
CVE-2020-14882
● Authenticated remote code execution
● Exploits weaknesses in WebLogic’s HTTP request handling
● Chained together with CVE-2020-14883 = unauthenticated RCE!
● Two methods
○ Shell Method
○ Remote XML Method
147
PAGE
CVE-2020-14882
● Shell Method
○ Very easy to execute
○ Sending a command using a handle to a library used by WebLogic’s web server
○ Only works for newer versions of WebLogic
○ 12.2.1.3.0 and newer
○ Not working on 10.3.6.0.0 and 12.1.3.0.0
○ Gimme passwords!
148
PAGE
149
CVE-2020-14882 – Shell Method
● Shell Method
○ Very easy to execute
○ Sending a command using a handle to a library used by WebLogic’s web server
○ Only works for newer versions of WebLogic
○12.2.1.3.0 and newer
○Not working on 10.3.6.0.0 and 12.1.3.0.0
○ Gimme passwords!
PAGE
CVE-2020-14882 – Remote XML Method
● Remote XML Method
○ “ShellSession” does not exist on older versions
○ We’ll use “FileSystemXmlApplicationContext”, which exists on every WebLogic version
• Harder than the Shell Method – and less likely to succeed
• Has many limitations
150
PAGE
CVE-2020-14882 – Remote XML Method
151
WebLogic Console
WebLogic Server
Malicious
Server
Attacker
Malicious URL
PAGE
CVE-2020-14882
• Step 1. Craft a malicious XML
152
PAGE
CVE-2020-14882
• Step 2. Execute it on the WebLogic server
153
PAGE
Now what??? - Post-Exploitation
● We have achieved unauthenticated remote code execution!
● Time to move on to the next goals
○ Find interesting, useful data
○ Upload a webshell
154
PAGE
WebLogic Management API
• A.K.A - WLS RESTful Management Interface
“WebLogic RESTful management services provide a comprehensive public interface for
configuring, monitoring, deploying and administering WebLogic Server in all supported
environments.”
155
PAGE
WebLogic Management API
• Management API
156
PAGE
Back to planning!
● New GOALS
○ Extract WebLogic console user credentials
○ Find interesting, useful data
○ Webshell
158
PAGE
Tell me your password WebLogic
● WebLogic saves its encrypted password in the following scenarios
○ WebLogic is running in development mode
■ config.xml
○ WebLogic has been configured with “quick startup” - no credentials are needed if server
restarts
■ boot.properties
● WebLogic always saves it’s encryption key in a file
○ SerializedSystemIni.dat
159
PAGE
Getting the files :)
• We already have RCE so can easily extract the files!
160
PAGE
Getting the files :)
● Extracting config.xml
161
PAGE
Getting the files :)
• Extracting boot.properties
162
PAGE
Getting the files :)
● Extracting SerializedSystemIni.dat
163
A blob of base64 data
PAGE
Getting the files :)
164
• Smashing ‘em all together into one payload
• And execute using the Shell Method
PAGE
Getting the files :)
165
• Smashing ‘em all together into one payload
• And execute using the Shell Method
PAGE
Time to decrypt!
PAGE
Time to decrypt!
Using a decryption script by gquere -
PAGE
Management API - Here we come!
• Management API
168
PAGE
170
Management API - Here we come!
● Finding databases
● …/management/weblogic/latest/serverConfig/JDBCSystemResources
● Databases
○ Press to CYBER
PAGE
173
Management API - Here we come!
● Finding deployed applications
● …/management/weblogic/latest/domainRuntime/deploymentManager/appDeploymentRuntimes
● Deployed Apps
○ App
PAGE
It’s WebShell time!
● Plan
● Download -> Modify -> Upload -> Victory
176
PAGE
It’s WebShell time!
● Step 1
Get the path for the deployed application
● …/management/weblogic/latest/edit/appDeployments/benefits
• App Path
177
PAGE
It’s WebShell time!
● Step 2
Download the file using CVE-2020-14882
● We get a WAR (Web Application Resource or Web Application Archive)
file that we can easily unzip
179
PAGE
It’s WebShell time!
● Step 3.
You must do AI stuff to be cool these days
● Ask ChatGPT to write a JSP WebShell
180
PAGE
181
It’s WebShell time!
● Step 4
Place the WebShell and rezip the WAR file
PAGE
182
It’s WebShell time!
● Step 5
Redeploy the application using the malicious WAR file
PAGE
183
It’s WebShell time!
● Step 6
Access the malicious JSP file
● …/benefits/webshell.jsp
● WebShell
PAGE
186
It’s WebShell time!
● Step 7
Write an article or present at a meetup or something idk :-)
PAGE
Summary
• We achieved unauthenticated remote code execution
• Using CVE-2020-14883 and CVE-2020-14882
• Shell Method
• Remote XML Method
• We obtained and decrypted WebLogic’s admin user credentials
• Using the admin credentials, we accessed the management API
• We decrypted database passwords
• We uploaded a malicious webshell to a legit application
187
PAGE
Mitigation
• Limit access to the admin port
• Monitor access to sensitive files
• config.xml, SerializedSystemIni.dat, boot.properties
• Monitor commands running using the server’s user
• Web Application Firewall (WAF)
• Multi Factor Authentication (MFA)
• Patch!!!
188
PAGE
Questions?
189
AI's Role in enhancing
Application Security
Brit Glazer
Linkedin - https://www.linkedin.com/in/brit-glazer-38b3779a/
About Me
Brit Glazer
Head of Information Security @ Unit Finance
InfoSec professional with over 13 years of
experience
Agenda
What is Machine Learning
1
Leverage AI for Enhanced
Protection in Application Security
2
Case Studies
3
Advantages of AI-Driven Systems
Over Traditional Methods
4
Safely Embracing AI
5
What is Machine Learning
Enhanced Productivity
1
Data Analysis and Insights
2
Cost Reduction
3
Scalability
4
A process of training algorithms to recognize patterns and relationships in data,
which can then be used to make predictions about new, unseen data.
Leverage AI for Enhanced Protection in
Application Security
Pattern
Recognition &
Anomaly
Detection
Immediate
Reaction to
Threats
Predictive
Analytics
Evolving with
Threats
Case Studies
AI In Financial
Services
‘BankSecure’
Case Studies
AI In E-
Commerce
‘ShopSmart’
Advantages of AI-Driven Systems Over
Traditional Methods
Speed
Learn &
Adapt
Cost -
Effective
Safely Embracing AI
Safeguard Data
Privacy &
Confidentiality
Comply with
Regulatory
Standards
Identify
Vulnerabilities &
Bias
Understand the
Technology
Prioritize Reputable
Sources
Q&A
Thank You!
Questions?
To be continued…
https://www.linkedin.com/company/application-security-virtual-meetups

More Related Content

Similar to The Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptx

A Byte of Software Deployment
A Byte of Software DeploymentA Byte of Software Deployment
A Byte of Software DeploymentGong Haibing
 
Using hypervisor and container technology to increase datacenter security pos...
Using hypervisor and container technology to increase datacenter security pos...Using hypervisor and container technology to increase datacenter security pos...
Using hypervisor and container technology to increase datacenter security pos...Black Duck by Synopsys
 
Using hypervisor and container technology to increase datacenter security pos...
Using hypervisor and container technology to increase datacenter security pos...Using hypervisor and container technology to increase datacenter security pos...
Using hypervisor and container technology to increase datacenter security pos...Tim Mackey
 
DevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer Tools
DevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer ToolsDevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer Tools
DevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer ToolsAmazon Web Services
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure codeFlaskdata.io
 
Containerisation Hack of a Legacy Software Solution - Alex Carter - CodeMill ...
Containerisation Hack of a Legacy Software Solution - Alex Carter - CodeMill ...Containerisation Hack of a Legacy Software Solution - Alex Carter - CodeMill ...
Containerisation Hack of a Legacy Software Solution - Alex Carter - CodeMill ...CodeMill digital skills
 
Microservices & Serverless Architecture Principles Applied - Cisco Live Orlan...
Microservices & Serverless Architecture Principles Applied - Cisco Live Orlan...Microservices & Serverless Architecture Principles Applied - Cisco Live Orlan...
Microservices & Serverless Architecture Principles Applied - Cisco Live Orlan...Cisco DevNet
 
I got 99 trends and a # is all of them
I got 99 trends and a # is all of themI got 99 trends and a # is all of them
I got 99 trends and a # is all of themRoberto Suggi Liverani
 
Code by the sea: Web Application Security
Code by the sea: Web Application SecurityCode by the sea: Web Application Security
Code by the sea: Web Application SecurityBoy Baukema
 
Oscon 2011-mueller-weinre
Oscon 2011-mueller-weinreOscon 2011-mueller-weinre
Oscon 2011-mueller-weinrepmuellr
 
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...Robert Conti Jr.
 
Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliverySecure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliveryBlack Duck by Synopsys
 
Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliverySecure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliveryTim Mackey
 
Tampere Docker meetup - Happy 5th Birthday Docker
Tampere Docker meetup - Happy 5th Birthday DockerTampere Docker meetup - Happy 5th Birthday Docker
Tampere Docker meetup - Happy 5th Birthday DockerSakari Hoisko
 
Xfocus xcon 2008_aks_oknock
Xfocus xcon 2008_aks_oknockXfocus xcon 2008_aks_oknock
Xfocus xcon 2008_aks_oknockownerkhan
 
Introduction to PaaS and Heroku
Introduction to PaaS and HerokuIntroduction to PaaS and Heroku
Introduction to PaaS and HerokuTapio Rautonen
 
Abusing bleeding edge web standards for appsec glory
Abusing bleeding edge web standards for appsec gloryAbusing bleeding edge web standards for appsec glory
Abusing bleeding edge web standards for appsec gloryPriyanka Aash
 
ReproNow—Save Time Reproducing and Triaging Security Bugs
ReproNow—Save Time Reproducing and Triaging Security BugsReproNow—Save Time Reproducing and Triaging Security Bugs
ReproNow—Save Time Reproducing and Triaging Security BugsPriyanka Aash
 
AWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWSAWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWSEric Smalling
 

Similar to The Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptx (20)

A Byte of Software Deployment
A Byte of Software DeploymentA Byte of Software Deployment
A Byte of Software Deployment
 
Using hypervisor and container technology to increase datacenter security pos...
Using hypervisor and container technology to increase datacenter security pos...Using hypervisor and container technology to increase datacenter security pos...
Using hypervisor and container technology to increase datacenter security pos...
 
Using hypervisor and container technology to increase datacenter security pos...
Using hypervisor and container technology to increase datacenter security pos...Using hypervisor and container technology to increase datacenter security pos...
Using hypervisor and container technology to increase datacenter security pos...
 
DevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer Tools
DevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer ToolsDevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer Tools
DevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer Tools
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure code
 
Containerisation Hack of a Legacy Software Solution - Alex Carter - CodeMill ...
Containerisation Hack of a Legacy Software Solution - Alex Carter - CodeMill ...Containerisation Hack of a Legacy Software Solution - Alex Carter - CodeMill ...
Containerisation Hack of a Legacy Software Solution - Alex Carter - CodeMill ...
 
Microservices & Serverless Architecture Principles Applied - Cisco Live Orlan...
Microservices & Serverless Architecture Principles Applied - Cisco Live Orlan...Microservices & Serverless Architecture Principles Applied - Cisco Live Orlan...
Microservices & Serverless Architecture Principles Applied - Cisco Live Orlan...
 
Hacking mobile apps
Hacking mobile appsHacking mobile apps
Hacking mobile apps
 
I got 99 trends and a # is all of them
I got 99 trends and a # is all of themI got 99 trends and a # is all of them
I got 99 trends and a # is all of them
 
Code by the sea: Web Application Security
Code by the sea: Web Application SecurityCode by the sea: Web Application Security
Code by the sea: Web Application Security
 
Oscon 2011-mueller-weinre
Oscon 2011-mueller-weinreOscon 2011-mueller-weinre
Oscon 2011-mueller-weinre
 
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
 
Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliverySecure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous Delivery
 
Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliverySecure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous Delivery
 
Tampere Docker meetup - Happy 5th Birthday Docker
Tampere Docker meetup - Happy 5th Birthday DockerTampere Docker meetup - Happy 5th Birthday Docker
Tampere Docker meetup - Happy 5th Birthday Docker
 
Xfocus xcon 2008_aks_oknock
Xfocus xcon 2008_aks_oknockXfocus xcon 2008_aks_oknock
Xfocus xcon 2008_aks_oknock
 
Introduction to PaaS and Heroku
Introduction to PaaS and HerokuIntroduction to PaaS and Heroku
Introduction to PaaS and Heroku
 
Abusing bleeding edge web standards for appsec glory
Abusing bleeding edge web standards for appsec gloryAbusing bleeding edge web standards for appsec glory
Abusing bleeding edge web standards for appsec glory
 
ReproNow—Save Time Reproducing and Triaging Security Bugs
ReproNow—Save Time Reproducing and Triaging Security BugsReproNow—Save Time Reproducing and Triaging Security Bugs
ReproNow—Save Time Reproducing and Triaging Security Bugs
 
AWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWSAWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWS
 

More from lior mazor

The Power of Malware Analysis and Development.pdf
The Power of Malware Analysis and Development.pdfThe Power of Malware Analysis and Development.pdf
The Power of Malware Analysis and Development.pdflior mazor
 
The CISO Problems Risk Compliance Management in a Software Development 030420...
The CISO Problems Risk Compliance Management in a Software Development 030420...The CISO Problems Risk Compliance Management in a Software Development 030420...
The CISO Problems Risk Compliance Management in a Software Development 030420...lior mazor
 
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...lior mazor
 
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptxSecure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptxlior mazor
 
Why 2024 will become the Year of SaaS Security Meetup 24012024.pptx
Why 2024 will become the Year of SaaS Security Meetup 24012024.pptxWhy 2024 will become the Year of SaaS Security Meetup 24012024.pptx
Why 2024 will become the Year of SaaS Security Meetup 24012024.pptxlior mazor
 
Vulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdf
Vulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdfVulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdf
Vulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdflior mazor
 
The Hacking Game - Think Like a Hacker Meetup 12072023.pptx
The Hacking Game - Think Like a Hacker Meetup 12072023.pptxThe Hacking Game - Think Like a Hacker Meetup 12072023.pptx
The Hacking Game - Think Like a Hacker Meetup 12072023.pptxlior mazor
 
Sailing Through The Storm of Kubernetes CVEs Meetup 29062023.pptx
Sailing Through The Storm of Kubernetes CVEs Meetup 29062023.pptxSailing Through The Storm of Kubernetes CVEs Meetup 29062023.pptx
Sailing Through The Storm of Kubernetes CVEs Meetup 29062023.pptxlior mazor
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxlior mazor
 
The Hacking Games - Cloud Vulnerabilities Meetup 22032023.pptx
The Hacking Games - Cloud Vulnerabilities Meetup 22032023.pptxThe Hacking Games - Cloud Vulnerabilities Meetup 22032023.pptx
The Hacking Games - Cloud Vulnerabilities Meetup 22032023.pptxlior mazor
 
The Hacking Games - Security vs Productivity and Operational Efficiency 20230119
The Hacking Games - Security vs Productivity and Operational Efficiency 20230119The Hacking Games - Security vs Productivity and Operational Efficiency 20230119
The Hacking Games - Security vs Productivity and Operational Efficiency 20230119lior mazor
 
The Hacking Games - Operation System Vulnerabilities Meetup 29112022
The Hacking Games - Operation System Vulnerabilities Meetup 29112022The Hacking Games - Operation System Vulnerabilities Meetup 29112022
The Hacking Games - Operation System Vulnerabilities Meetup 29112022lior mazor
 
Software Supply Chain Security Meetup 21062022
Software Supply Chain Security Meetup 21062022Software Supply Chain Security Meetup 21062022
Software Supply Chain Security Meetup 21062022lior mazor
 
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...lior mazor
 
User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022lior mazor
 
Securing and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 bSecuring and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 blior mazor
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021lior mazor
 
Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021lior mazor
 
Application security meetup data privacy_27052021
Application security meetup data privacy_27052021Application security meetup data privacy_27052021
Application security meetup data privacy_27052021lior mazor
 
Application security meetup 02032021
Application security meetup 02032021Application security meetup 02032021
Application security meetup 02032021lior mazor
 

More from lior mazor (20)

The Power of Malware Analysis and Development.pdf
The Power of Malware Analysis and Development.pdfThe Power of Malware Analysis and Development.pdf
The Power of Malware Analysis and Development.pdf
 
The CISO Problems Risk Compliance Management in a Software Development 030420...
The CISO Problems Risk Compliance Management in a Software Development 030420...The CISO Problems Risk Compliance Management in a Software Development 030420...
The CISO Problems Risk Compliance Management in a Software Development 030420...
 
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
 
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptxSecure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
 
Why 2024 will become the Year of SaaS Security Meetup 24012024.pptx
Why 2024 will become the Year of SaaS Security Meetup 24012024.pptxWhy 2024 will become the Year of SaaS Security Meetup 24012024.pptx
Why 2024 will become the Year of SaaS Security Meetup 24012024.pptx
 
Vulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdf
Vulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdfVulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdf
Vulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdf
 
The Hacking Game - Think Like a Hacker Meetup 12072023.pptx
The Hacking Game - Think Like a Hacker Meetup 12072023.pptxThe Hacking Game - Think Like a Hacker Meetup 12072023.pptx
The Hacking Game - Think Like a Hacker Meetup 12072023.pptx
 
Sailing Through The Storm of Kubernetes CVEs Meetup 29062023.pptx
Sailing Through The Storm of Kubernetes CVEs Meetup 29062023.pptxSailing Through The Storm of Kubernetes CVEs Meetup 29062023.pptx
Sailing Through The Storm of Kubernetes CVEs Meetup 29062023.pptx
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
 
The Hacking Games - Cloud Vulnerabilities Meetup 22032023.pptx
The Hacking Games - Cloud Vulnerabilities Meetup 22032023.pptxThe Hacking Games - Cloud Vulnerabilities Meetup 22032023.pptx
The Hacking Games - Cloud Vulnerabilities Meetup 22032023.pptx
 
The Hacking Games - Security vs Productivity and Operational Efficiency 20230119
The Hacking Games - Security vs Productivity and Operational Efficiency 20230119The Hacking Games - Security vs Productivity and Operational Efficiency 20230119
The Hacking Games - Security vs Productivity and Operational Efficiency 20230119
 
The Hacking Games - Operation System Vulnerabilities Meetup 29112022
The Hacking Games - Operation System Vulnerabilities Meetup 29112022The Hacking Games - Operation System Vulnerabilities Meetup 29112022
The Hacking Games - Operation System Vulnerabilities Meetup 29112022
 
Software Supply Chain Security Meetup 21062022
Software Supply Chain Security Meetup 21062022Software Supply Chain Security Meetup 21062022
Software Supply Chain Security Meetup 21062022
 
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
 
User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022
 
Securing and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 bSecuring and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 b
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021
 
Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021
 
Application security meetup data privacy_27052021
Application security meetup data privacy_27052021Application security meetup data privacy_27052021
Application security meetup data privacy_27052021
 
Application security meetup 02032021
Application security meetup 02032021Application security meetup 02032021
Application security meetup 02032021
 

Recently uploaded

costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

The Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptx