Picking Lockfiles - Attacking & Defending Your Supply Chain
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the offensive and defensive aspects of supply chain attacks targeting open source software projects in this 31-minute Black Hat conference talk. Learn about a specific attack technique that conceals malicious code within open source contributions, making it difficult to detect during code reviews. Dive into the concept of lockfile tampering, understanding its implications for software integrity. Examine real-world examples, including a GitLab merge request and automated dependency updates. Gain insights into attacker techniques, objectives, and tooling, such as the Bump-Key tool. Discover defensive strategies to protect your supply chain and understand the importance of lockfile integrity. Enhance your knowledge of both the attacker's perspective and defensive measures in this comprehensive exploration of supply chain security in open source development.
Syllabus
Intro
A Quick Story
Why are we talking about supply chains?
Attacking Supply Chains with Lockfiles
Defending Supply Chains
Lockfile example
Lockfile Tampering - Example
Multiple Attributes Occurrences
Integrity Hash Not Mandatory
Attacker Perspective: Compromising Supply Chains using Lockfiles
Attacker Techniques and Objectives
Bump-Key Tooling
Example: GitLab Merge Request
Example: Automated Dependency Update
Closing Words
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube