Joe Beeton

Senior Application Security Researcher Contrast Security

BIOGRAPHY

I’m a recovering Java Developer. I started my career as a Java developer writing Archive/Backup software before moving to a large financial company working on webapps and the backend APIs. However, after a while writing yet another microservice isn’t that much fun anymore, but breaking them was. So I moved to Application Security and from there to Research. Now I work as Security Researcher for Contrast Security.  

Attacking Developer Environment Through Drive-by Localhost Attacks

There is a widespread belief that services that are only bound to localhost are not accessible from the outside world this is unfortunately not always the case. Developers for convenience sake will run services they are developing configured in a less secure way compared to how they would (hopefully!) do in higher environments. By compromising websites developers use, just injecting JS into adverts served on those sites or just a phishing attack that gets the developer to open a web browser on a compromised page, it is possible to reach out via non Pre-Flighted HTTP requests to those services bound to localhost, by exploiting common misconfigurations in Spring, or known vulnerabilities found by myself, including the recently disclosed Critical Vulnerability in Quarkus ( https://www.contrastsecurity.com/security-influencers/localhost-attack-against-quarkus-developers-contrast-security ). 

I’ll demonstrate during the talk, it is possible to generate a RCE on the developer’s machine or on other services on their private network. How this class of attack works and what can be done to defend against it. As developers have write access to codebases, AWS keys, server creds etc., access to the developer’s machine gives an attacker a great deal of scope to pivot to other resources on the network, modify or just steal the codebase.

Are you the next cyber security superstar?

If you are passionate about an information security topic or you have strong technical skills developing researches on your own, you should definitely Apply at Call for Papers. By submitting you will have the chance to showcase your work to +2000 attendees.

Other speakers joining this year

Ioan Constantin

Cyber Security Expert Orange

Radu Chivereanu

Machine Learning Engineer Intern Adobe

George-Andrei Iosif

Software Security Engineer Canonical

Ready for this year's presentations?

By registering you will unlock access to 60+ speakers and two full days with cyber security news & showcases from worldwide leaders.

SPEAKERS
0
COUNTRIES
0
ATTENDEES
0
HACKING
COMPETITIONS
0
COMPANIES
0

Sponsors & Partners

They help us make this conference possible.

POWERED BY

Orange Business is a key division of Orange Romania, specializing in providing cutting-edge communication, technology, and digital transformation solutions tailored to businesses of all sizes. With a strong emphasis on innovation, Orange Business offers a wide array of services, including high-speed connectivity, cloud computing, cybersecurity, Internet of Things (IoT), and managed services. Their mission is to support organizations in their digital transformation journey by enhancing operational efficiency, improving customer experience, and maintaining a competitive edge in a rapidly changing digital environment.

Orange Business combines deep technological expertise with a customer-centric approach, ensuring that each solution is customized to meet the specific needs of their clients. Their commitment to innovation and excellence makes them a trusted partner for businesses seeking to thrive in the digital age.

PLATINUM PARTNERS
GOLD PARTNERS

 

SILVER PARTNER

BRONZE PARTNERS

HACKING VILLAGE PARTNERS

EXHIBITORS

VIP LOUNGE POWERED BY
ORGANIZER
INTERNATIONAL COMMUNITY PARTNERS
MEDIA PARTNERS

Add Your Heading Text Here