Vulnerable by Design:Unguard,The Insecure Cloud-Native Twitter Clone- Simon Ammer, Christoph Wedenig

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • number6
    404 Image not found
    • Apr 2019
    • 2172

    #1

    Vulnerable by Design:Unguard,The Insecure Cloud-Native Twitter Clone- Simon Ammer, Christoph Wedenig

    Vulnerable by Design: Unguard, The Insecure Cloud-Native Twitter Clone

    Friday August 11, 10:00 – 11:55, Accord Boardroom, Forum

    Simon Ammer, Christoph Wedenig

    Unguard is an intentionally insecure, cloud-native microservices demo application that serves as a playground for cybersecurity enthusiasts to sharpen their skills and for cybersecurity companies to test their software. Designed to mimic a web-based Twitter clone, the platform offers user registration, login, content posting, and social interactions, all with a wide variety of exploitable vulnerabilities. Featuring a wide range of security flaws, including SSRF, Command/SQL Injection, Log4Shell, and Spring4Shell, Unguard challenges security professionals, developers, and students to identify, exploit, and understand these weaknesses. Simultaneously, the platform showcases deceptive elements, such as phony ads and profile management options, which further enhance the real-world experience offered by the demo.

    Simon's interest in cybersecurity was sparked after listening to the Darknet Diaries podcast, which led him to pursue a career in this fascinating field. He studied Software Engineering and Mobile Computing in Austria, focusing on enhancing web vulnerability scanner reports for his Master's thesis. Driven by his passion for cybersecurity, Simon decided to further expand his knowledge by enrolling in another Master's program specializing in Artificial Intelligence. Currently, he holds the position of Research Software Engineer in the cloud-native security team at Dynatrace. There, he leverages his knowledge to employ AI to improve security measures and safeguard digital infrastructures.

    Christoph always loved to interact with software systems, even more so in unintended ways. He studied Applied Computer Science in the south of Austria, focusing on the detection of server-side request forgery in his Master’s thesis. As a demo environment for this thesis, he created a small distributed application called “Vogelgrippe” which was then later extended for various other use cases until being renamed to Unguard and finally gifted to the community as an Open-Source playground. Currently, he is working in the Application security team at Dynatrace, where he helps build a wide suite of security-related software.

    Audience - Offense, Defense
    Starts
    August 11, 2023 10:00
    Ends
    August 11, 2023 11:55
    Location
    Accord Boardroom, Forum
  • byskippy
    Member
    • Aug 2023
    • 1

    #2
    Here is a detailed description and a sneak peek of Unguard. See you today in the Demo Lab 😁

    Unguard is a purposely insecure microservice application for vulnerability testing, analysis, and education. Unlike other microservice-based demo applications such as Google's Online Boutique, DeathStarBench, and Weaveworks' Sock Shops, Unguard stands out due to its built-in vulnerabilities, making it the perfect playground for security enthusiasts, cybersecurity companies, and those looking to understand security risks in microservice applications better.

    Unguard consists of eight microservices written in different programming languages, including Java, Node.js, .NET, and Go. These microservices communicate with each other using RESTful APIs and interact with various databases such as H2, MariaDB, and Redis. Designed for Kubernetes, Unguard can be deployed locally using Kind or Minikube or on cloud platforms like EKS on AWS. This flexibility enables users to experiment with the application in various environments, simulating real-world scenarios.

    Most of Unguard's services are instrumented with Jaeger trace interceptors to facilitate monitoring and analysis. These interceptors provide valuable insights into the performance and behavior of the application, helping to identify bottlenecks, potential security threats, and other issues that might arise during testing.

    Unguard contains over eight documented vulnerabilities, including Server-Side Request Forgery (SSRF), RCE using Log4Shell, JSON Web Token (JWT) Forgery, Carriage Return Line Feed (CRLF) Injection, and many more. It provides a comprehensive set of challenges for those exploring and exploiting security vulnerabilities in microservice applications.
    All these vulnerabilities can also be more easily exploited using the exploit scripts that ship with Unguard.
    Attached Files

    Comment

    Working...