A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Spy Vs. Spy: How to Use Breakable Dependencies to Your Advantage - Stacey Banks Anne Henmi Derbycon 2015 (Hacking Illustrated Series InfoSec Tutorial Videos)

Spy Vs. Spy: How to Use Breakable Dependencies to Your Advantage
Stacey Banks Anne Henmi
Derbycon 2015

When a dependency comes along can you break it? Break it good? The reliance on third-party applications can unleash a dependency hell upon your network. How well do you trust the integrity of third party integrations that affect your code, your systems, and any COTS/GOTS you purchase? We will take a look at vulnerabilities that have been exploited and how they broke the perceived security of the network. Looking at the flaws in the trust chain we can see where the weaknesses are introduced and begin to devise ways to exploit them. When you're leveraging third party applications, and everyone is, you have to ask yourself ‰ÛÏDo I feel lucky?‰Û. Well, do ya, punk?

Stacey Banks: InfoSec Wonk. Geek. Pirate Captain. Triathlete. GRT. Anne Henmi: InfoSec Cynic. Geek. Writer. Mountain Biker. LEGO Builder.

Back to Derbycon 2015 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast