mastouille.fr est l'un des nombreux serveurs Mastodon indépendants que vous pouvez utiliser pour participer au fédiverse.
Mastouille est une instance Mastodon durable, ouverte, et hébergée en France.

Administré par :

Statistiques du serveur :

589
comptes actifs

#SAST

0 message0 participant0 message aujourd’hui
Paco Hope #resist<p>Funny way to evade a lot of <a href="https://infosec.exchange/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> <a href="https://infosec.exchange/tags/SAST" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SAST</span></a> checkers that try to check your terraform or CDK or CloudFormation. They often look for open security groups (i.e., <code>0.0.0.0/0</code>). Sadly, most of these tools are looking for THAT string. They don't evaluate it as a CIDR. You might really want a rule that says "anything bigger than /16 is suspicious". But that's not how they work.</p><p>So a couple rules like <code>0.0.0.0/1</code> and <code>128.0.0.0/1</code> will pretty much get you the whole Internet, but probably slip right past most of the "open-to-the-internet" checkers. Likewise they will catch <code>::/0</code> but will not catch <code>::/1</code> or <code>1000::/1</code>.</p><p>One thing I did notice is that security groups normalize their CIDR ranges. So you could get a string like <code>8.8.8.8/0</code> through a static code analyzer (because it's not the string <code>0.0.0.0/0</code>) but EC2 will normalize that to <code>0.0.0.0/0</code> when it stores it. So if you do a dynamic check by asking for the security group's ingress rules, it will report back <code>0.0.0.0/0</code> even though you had sent <code>8.8.8.8/0</code> originally.</p><p>I can't wait to see how AI will handle this.</p>
Arthur Lutz (Zenika)<p>🎉 J'ai fini le "Learning Path" DevSecOps sur TryHackMe ! 🏆 Une certification de plus ! </p><p><a href="https://tryhackme.com/path/outline/devsecops" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tryhackme.com/path/outline/dev</span><span class="invisible">secops</span></a></p><p>Super ateliers et contenus sur la supply chain, la sécurité dans la CI/CD, les outils de detection de failles, le hardening de conteneurs, docker, kubernetes, et même sur du terraform. </p><p><a href="https://pouet.chapril.org/tags/DevSecOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevSecOps</span></a> <a href="https://pouet.chapril.org/tags/DevOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevOps</span></a> <a href="https://pouet.chapril.org/tags/TryHackMe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TryHackMe</span></a> <a href="https://pouet.chapril.org/tags/Gitlab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Gitlab</span></a> <a href="https://pouet.chapril.org/tags/Jenkins" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Jenkins</span></a> <a href="https://pouet.chapril.org/tags/CICD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CICD</span></a> <a href="https://pouet.chapril.org/tags/SAST" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SAST</span></a> <a href="https://pouet.chapril.org/tags/DAST" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DAST</span></a></p>
Paco Hope #resist<p>You might wonder what kinds of tools <a href="https://infosec.exchange/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> consultants use to automate <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/code" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>code</span></a> <a href="https://infosec.exchange/tags/scanning" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scanning</span></a>. One of the internal teams has just open-sourced one of our tools that was internal-only for a long time. It basically dockerises and runs a whole pile of free <a href="https://infosec.exchange/tags/sast" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sast</span></a> tools. I know the folks that write this and we leverage it pretty heavily in our business. <a href="https://github.com/awslabs/automated-security-helper" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/awslabs/automated-s</span><span class="invisible">ecurity-helper</span></a></p>
Melinda Marks<p>It's taken me almost a year to write (and edit) my rant about categories and acronyms in cybersecurity. Which acronyms or categories annoy you the most? Security teams don't need more tools, they need efficient ways to mitigate risk and respond quickly to threats or attacks - especially now to keep up with faster development cycles.<br><a href="https://www.techtarget.com/searchsecurity/opinion/Cloud-native-app-security-Ignore-acronyms-solve-problems" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">techtarget.com/searchsecurity/</span><span class="invisible">opinion/Cloud-native-app-security-Ignore-acronyms-solve-problems</span></a><br><a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudsecurity</span></a> <a href="https://infosec.exchange/tags/applicationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>applicationsecurity</span></a> <a href="https://infosec.exchange/tags/appsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>appsec</span></a> <a href="https://infosec.exchange/tags/cspm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cspm</span></a> <a href="https://infosec.exchange/tags/sast" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sast</span></a> <a href="https://infosec.exchange/tags/dast" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dast</span></a> <a href="https://infosec.exchange/tags/iast" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iast</span></a> <a href="https://infosec.exchange/tags/sca" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sca</span></a> <a href="https://infosec.exchange/tags/sbom" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sbom</span></a> <a href="https://infosec.exchange/tags/ciem" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ciem</span></a> <a href="https://infosec.exchange/tags/asoc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>asoc</span></a> <a href="https://infosec.exchange/tags/dspm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dspm</span></a> <a href="https://infosec.exchange/tags/aspm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aspm</span></a> <a href="https://infosec.exchange/tags/cnapp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cnapp</span></a> <a href="https://infosec.exchange/tags/cdr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cdr</span></a> <a href="https://infosec.exchange/tags/mdr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mdr</span></a> <a href="https://infosec.exchange/tags/itdr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>itdr</span></a> <a href="https://infosec.exchange/tags/ndr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ndr</span></a> <a href="https://infosec.exchange/tags/mdr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mdr</span></a> <a href="https://infosec.exchange/tags/xdr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>xdr</span></a> <a href="https://infosec.exchange/tags/edr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>edr</span></a> <a href="https://infosec.exchange/tags/cnapp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cnapp</span></a> <a href="https://infosec.exchange/tags/wapp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wapp</span></a> <a href="https://infosec.exchange/tags/devsecops" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>devsecops</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/ciso" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ciso</span></a> <a href="https://infosec.exchange/tags/cso" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cso</span></a></p>
Tanya Janca | SheHacksPurple :verified: :verified:<p>Let's talk about static analysis - a term that might sound super complex, but it's really just a fancy way of saying: "Hey, let's check your code and make sure it's secure!" 🔐 How do YOU feel about static analysis? 😅 Share your thoughts! <a href="https://infosec.exchange/tags/StaticAnalysis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>StaticAnalysis</span></a> <a href="https://infosec.exchange/tags/CodeSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CodeSecurity</span></a> <a href="https://infosec.exchange/tags/SAST" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SAST</span></a>💻</p>
Markus Eisele<p><a href="https://mastodon.online/tags/bearer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bearer</span></a>: Code security scanning tool (<a href="https://mastodon.online/tags/SAST" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SAST</span></a>) that discover, filter and prioritize security risks and vulnerabilities leading to sensitive data exposures (PII, PHI, PD). <a href="https://github.com/Bearer/bearer" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">github.com/Bearer/bearer</span><span class="invisible"></span></a><br><a href="https://mastodon.online/tags/JavaScript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>JavaScript</span></a> <a href="https://mastodon.online/tags/Python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Python</span></a> <a href="https://mastodon.online/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a></p>
jeffluszcz<p>I propose that source generated by AI code generators should have a short human and machine readable comment tag to allow better <a href="https://mastodon.social/tags/SCA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SCA</span></a> &amp; <a href="https://mastodon.social/tags/SAST" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SAST</span></a> scanning due to the IP and <a href="https://mastodon.social/tags/aiart" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aiart</span></a> related static analysis needs. I welcome thoughts, feedback and especially tag suggestions! More in my blog: <a href="https://zebracatzebra.com/blog/a-proposal-for-comment-tagging-ai-generated-source-code/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">zebracatzebra.com/blog/a-propo</span><span class="invisible">sal-for-comment-tagging-ai-generated-source-code/</span></a></p>
Max Maass :donor:<p>And, just so that the <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> people following me don't think that I will never post about these topics here: I recently wrote about the security implications of <a href="https://infosec.exchange/tags/Java" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Java</span></a> <a href="https://infosec.exchange/tags/Spring" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spring</span></a> Actuators, and how having too many of them turned on can be a serious security risk: <a href="https://blog.maass.xyz/spring-actuator-security-part-1-stealing-secrets-using-spring-actuators" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.maass.xyz/spring-actuator</span><span class="invisible">-security-part-1-stealing-secrets-using-spring-actuators</span></a>. May be a helpful for your <a href="https://infosec.exchange/tags/pentest" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentest</span></a>'s and <a href="https://infosec.exchange/tags/bugbounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bugbounty</span></a> hunting - I like to keep a few ffuf inputs around for this purpose.</p><p>And if you are on the <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a>, I also wrote about how you can construct <a href="https://infosec.exchange/tags/semgrep" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>semgrep</span></a> <a href="https://infosec.exchange/tags/SAST" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SAST</span></a> rules to find dangerous configurations: <a href="https://blog.maass.xyz/spring-actuator-security-part-2-finding-actuators-using-static-code-analysis-with-semgrep" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.maass.xyz/spring-actuator</span><span class="invisible">-security-part-2-finding-actuators-using-static-code-analysis-with-semgrep</span></a> (the rules don't cover all possible ways of doing this, simply because the config files offer way too many options of doing the same thing - but I still think it's a worthwhile introduction to writing your own semgrep rules, which is one of my favourite things to do)</p><p>Really hope that I'll find the time to finish off that series of posts soon, because there's a different post I've been itching to write for months now, which involves a really neat exploit based on incorrect use of cryptography that I found in a recent engagement...</p>