SCAGoat - Exploiting Damn Vulnerable SCA Application : Prashant Venkatesh : Hare Krishna Rai

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • number6
    404 Image not found
    • Apr 2019
    • 2172

    #1

    SCAGoat - Exploiting Damn Vulnerable SCA Application : Prashant Venkatesh : Hare Krishna Rai

    Title: SCAGoat - Exploiting Damn Vulnerable SCA Application
    Presenter: Prashant Venkatesh
    Co-Presenter: Hare Krishna Rai
    Location: W305
    Day,Time: Fri Aug 9 , 2PM - 3:45PM
    Audience: Security Research, Security Engineers, DevOps
    Project: https://github.com/harekrishnarai/Damn-vulnerable-sca

    Abstract:
    SCAGoat is a deliberately insecure web application designed for learning and testing Software Composition Analysis (SCA) tools. It offers a hands-on environment to explore vulnerabilities in Node.js and Java Springboot applications, including actively exploitable CVEs like CVE-2023-42282 and CVE-2021-44228 (log4j). This application can be utilized to evaluate various SCA and container security tools, assessing their capability to identify vulnerable packages and code reachability. As part of our independent research, the README includes reports from SCA tools like semgrep, snyk, and endor labs. Future research plans include incorporating compromised or malicious packages to test SCA tool detection and exploring supply chain attack scenarios.

    Bios:
    * Presenter:
    Prashant Venkatesh is an information security expert with over 20 years of experience. He presently works as Manager, Product Security at an ecommerce company. Prashant is an enthusiastic participant in the field who consistently coordinates, reviews papers, and presents his work at numerous InfoSec conferences, including Blackhat Nullcon and c0c0n. He is also active through the OWASP Bay Area chapter Leadership and is co-founder of the annual Seasides Conference in India.
    * Co-Presenter:
    As a Product Security Engineer, Hare Krishna Rai's passion for cybersecurity drives him to excel in various areas. He specializes in conducting penetration testing, actively participates in security Capture The Flag (CTF) competitions, and performs code reviews to ensure secure code development. His expertise extends to leveraging Static Application Security Testing (SAST) techniques in languages like Java, Python, JavaScript, JSP, among others.
    Starts
    August 9, 2024 14:00
    Ends
    August 9, 2024 15:45
    Location
    W305
    Last edited by number6; June 25, 2024, 16:00.
Working...