ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

Action Anomalies: A Hackers Guide To Github Actions - Elliot Ward

Автор: DEFCON Switzerland

Загружено: 2024-07-04

Просмотров: 642

Описание: Elliot Ward (Snyk)

In the DevOps era of frequent releases, CI tools such as Github actions are powerful platforms to
enable secure and rapid software releases, but what additional attack surface do these often privileged components come with? This talk covers a recent research project from Snyk Security Labs to understand Github actions in depth and how they can be attacked to leak cloud environment access tokens, arbitrary secrets and result in a full compromise of the repository. Security engineers,
pentesters and bug hunters alike will come away knowing the threat landscape for Githubs CI platform, and through case studies of high impact vulnerabilities we have uncovered, be equipped to exploit and secure Github actions.

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
Action Anomalies: A Hackers Guide To Github Actions - Elliot Ward

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

Nearing The EPOcalypse: A Tale Of Vulnerabilities & Incentives In The Infosec Industry - Alain Mowat

Nearing The EPOcalypse: A Tale Of Vulnerabilities & Incentives In The Infosec Industry - Alain Mowat

How to use GitHub Actions with Security in mind - Rob Bos - NDC Security 2022

How to use GitHub Actions with Security in mind - Rob Bos - NDC Security 2022

Components & JSX in React Explained with Real-Life Examples | Day 12/100

Components & JSX in React Explained with Real-Life Examples | Day 12/100

Phishing The  Resistant: Phishing For Primary Refresh Tokens In Microsoft Entra - Dirk-Jan Mollema

Phishing The Resistant: Phishing For Primary Refresh Tokens In Microsoft Entra - Dirk-Jan Mollema

Actionable Incident Response Documentation: When The Ink Meets The Road - Gergana Karadzhova-Dangela

Actionable Incident Response Documentation: When The Ink Meets The Road - Gergana Karadzhova-Dangela

ALASCA Summit 2025 - CAPI vs. ClusterStacks: The Better is the Enemy of the Good

ALASCA Summit 2025 - CAPI vs. ClusterStacks: The Better is the Enemy of the Good

GitHub Actions Tutorial | From Zero to Hero in 90 minutes (Environments, Secrets, Runners, etc)

GitHub Actions Tutorial | From Zero to Hero in 90 minutes (Environments, Secrets, Runners, etc)

The CTF To Career Pipeline - Jam (Vie) Polintan

The CTF To Career Pipeline - Jam (Vie) Polintan

Лучший Гайд по Kafka для Начинающих За 1 Час

Лучший Гайд по Kafka для Начинающих За 1 Час

Reconsidering Self-XSS And Exploring Novel Attacks With Cookie Tossing - Thomas Houhou

Reconsidering Self-XSS And Exploring Novel Attacks With Cookie Tossing - Thomas Houhou

Efficiency vs Security: Unveiling The Risks In Cloud-Based Endpoint Management - Oleksandr Kazymyrov

Efficiency vs Security: Unveiling The Risks In Cloud-Based Endpoint Management - Oleksandr Kazymyrov

Гайд по созданию Telegram бота на Python + деплой

Гайд по созданию Telegram бота на Python + деплой

Но что такое нейронная сеть? | Глава 1. Глубокое обучение

Но что такое нейронная сеть? | Глава 1. Глубокое обучение

Mastering Supply Chain Attacks With Client-Side Monitoring - Juerg Fischer and Dai Littlewood

Mastering Supply Chain Attacks With Client-Side Monitoring - Juerg Fischer and Dai Littlewood

Automating Malware Development: A Red Teamer's Journey - Gian Demarmels

Automating Malware Development: A Red Teamer's Journey - Gian Demarmels

Calming Meditation | 1 hour handpan music | Malte Marten

Calming Meditation | 1 hour handpan music | Malte Marten

An Elixir Savannah Modem Safari - Taun Chapman

An Elixir Savannah Modem Safari - Taun Chapman

Machine Learning For Enhanced Malware Detection & Classification - Solomon Sonya

Machine Learning For Enhanced Malware Detection & Classification - Solomon Sonya

apt, dpkg, git, Python PiP (Linux Package Management) // Linux for Hackers // EP 5

apt, dpkg, git, Python PiP (Linux Package Management) // Linux for Hackers // EP 5

КАК УСТРОЕН TCP/IP?

КАК УСТРОЕН TCP/IP?

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]