Dependency Confusion Explained - New Supply Chain Attack

  Рет қаралды 2,560

Aidan Glickman

Aidan Glickman

Күн бұрын

Пікірлер: 19
@alexadelabu7926
@alexadelabu7926 3 жыл бұрын
really quality content, you explained it really well
@harwindersandhu6794
@harwindersandhu6794 3 жыл бұрын
Good Content, keep it up. One Question, in your macOS terminal screenshots, how are you displaying "Apple" and "Home" icons?
@AidanGlickman
@AidanGlickman 3 жыл бұрын
Thanks! That comes from the Powerlevel10k theme.
@Manishkumar-pv7zg
@Manishkumar-pv7zg 3 жыл бұрын
what is the step to perform these attack
@AidanGlickman
@AidanGlickman 3 жыл бұрын
I go over a basic blueprint in the video, but at a basic level an attacker would find the name of a private dependency, and upload a public package with the same name and a higher version number that contains malicious pre-install code which phones home to a network controlled by the attacker.
@aging5280
@aging5280 3 жыл бұрын
I'm stoked everywhere. How on earth did he included his dns or backdoor url to the json file
@AidanGlickman
@AidanGlickman 3 жыл бұрын
He used a DNS exfiltration technique where he encoded all of the data that he was getting out of the system as part of the DNS query he was making, and then his custom nameserver was set to log every request it received. From there he could easily read the data back out.
@aging5280
@aging5280 3 жыл бұрын
Thanks for early replay bro.
@aging5280
@aging5280 3 жыл бұрын
I don't really understand this so well. I saw the exact code he use to create the backdoor but I don't know how he included his dns server on the target depency
@AidanGlickman
@AidanGlickman 3 жыл бұрын
He included it in the preinstall hook, where a dependency can call an arbitrary script when it is downloaded. This is normally used to download external dependencies and binaries, but can be used maliciously as well.
@aging5280
@aging5280 3 жыл бұрын
Thanks for your hard work. You deserve me as a subscriber
@CharleyDC5R
@CharleyDC5R 3 жыл бұрын
Is Maven also impacted by this?
@AidanGlickman
@AidanGlickman 3 жыл бұрын
Maven/Gradle is impacted. Gradle put out a deck on mitigation strategies here: www.jfokus.se/jfokus20-preso/Protecting-your-organization-against-attacks-via-the-build-system.pdf
@sealsquadgaming7994
@sealsquadgaming7994 3 жыл бұрын
Can you please elaborate how to find package names ??
@pyrosophy680
@pyrosophy680 3 жыл бұрын
Hey, that's quality content and you just got a subscriber. Pay attention to your body posture (keep your chin a bit more downwards for example). Keep it up, you will grow fast.
@AidanGlickman
@AidanGlickman 3 жыл бұрын
Thanks! Always working on refining my style
@brianbitange6650
@brianbitange6650 3 жыл бұрын
Good content bro!
@AidanGlickman
@AidanGlickman 3 жыл бұрын
Thanks!
@gradientO
@gradientO 3 жыл бұрын
npm is a mess
Cracking Enigma in 2021 - Computerphile
21:20
Computerphile
Рет қаралды 2,5 МЛН
How Many Balloons To Make A Store Fly?
00:22
MrBeast
Рет қаралды 167 МЛН
coco在求救? #小丑 #天使 #shorts
00:29
好人小丑
Рет қаралды 74 МЛН
The IMPOSSIBLE Puzzle..
00:55
Stokes Twins
Рет қаралды 196 МЛН
Dear Game Developers, Stop Messing This Up!
22:19
Jonas Tyroller
Рет қаралды 733 М.
Transformers (how LLMs work) explained visually | DL5
27:14
3Blue1Brown
Рет қаралды 3,8 МЛН
Kerberos Authentication Explained | A deep dive
16:52
Destination Certification
Рет қаралды 358 М.
All Rust string types explained
22:13
Let's Get Rusty
Рет қаралды 184 М.
TLS Handshake Explained - Computerphile
16:59
Computerphile
Рет қаралды 567 М.
NPM packages are getting hacked
10:37
Hitesh Choudhary
Рет қаралды 38 М.
TCP/IP for Programmers
3:03:31
Eli the Computer Guy
Рет қаралды 231 М.
The Art of Code - Dylan Beattie
1:00:49
NDC Conferences
Рет қаралды 4,7 МЛН