Joe Beeton

Senior Application Security Researcher Contrast Security

BIOGRAPHY

I’m a recovering Java Developer. I started my career as a Java developer writing Archive/Backup software before moving to a large financial company working on webapps and the backend APIs. However, after a while writing yet another microservice isn’t that much fun anymore, but breaking them was. So I moved to Application Security and from there to Research. Now I work as Security Researcher for Contrast Security.  

Attacking Developer Environment Through Drive-by Localhost Attacks

There is a widespread belief that services that are only bound to localhost are not accessible from the outside world this is unfortunately not always the case. Developers for convenience sake will run services they are developing configured in a less secure way compared to how they would (hopefully!) do in higher environments. By compromising websites developers use, just injecting JS into adverts served on those sites or just a phishing attack that gets the developer to open a web browser on a compromised page, it is possible to reach out via non Pre-Flighted HTTP requests to those services bound to localhost, by exploiting common misconfigurations in Spring, or known vulnerabilities found by myself, including the recently disclosed Critical Vulnerability in Quarkus ( https://www.contrastsecurity.com/security-influencers/localhost-attack-against-quarkus-developers-contrast-security ). 

I’ll demonstrate during the talk, it is possible to generate a RCE on the developer’s machine or on other services on their private network. How this class of attack works and what can be done to defend against it. As developers have write access to codebases, AWS keys, server creds etc., access to the developer’s machine gives an attacker a great deal of scope to pivot to other resources on the network, modify or just steal the codebase.

Are you the next cyber security superstar?

If you are passionate about an information security topic or you have strong technical skills developing researches on your own, you should definitely Apply at Call for Papers. By submitting you will have the chance to showcase your work to +2000 attendees.

Other speakers joining this year

Abdullah Joseph

Senior Security Researcher Appsflyer

Marek Zmysłowski

Senior Security Engineer Azure DevOps

Inbar Raz

VP of Research Zenity

Ready for this year's presentations?

By registering you will unlock access to 60+ speakers and two full days with cyber security news & showcases from worldwide leaders.

SPEAKERS
0
COUNTRIES
0
ATTENDEES
0
HACKING
COMPETITIONS
0
COMPANIES
0

Sponsors & Partners

They help us make this conference possible.

POWERED BY

Orange Romania is part of the Orange Group, one of the largest global telecommunications operators that connects hundreds of millions of customers worldwide. With over 11 million local customers and an annual turnover exceeding 1.5 billion euros, Orange Romania connects 1 in 2 Romanians and offers an extensive range of communication solutions for both individual and corporate customers, from basic connectivity services to complete mobile, fixed internet, TV packages, and complex IT&C solutions through Orange Business

Orange Romania is the number 1 operator in terms of network performance, and also holds nine consecutive Top Employer certifications, which confirm that Orange Romania, in addition to the remarkable products and services it offers, pays special attention to its employees and working environment. In the past 3 years Orange has launched two 5G Labs in Bucharest and Iasi, that aim to support researchers, startups and companies to test their 5G solutions in advance. 

In addition, Orange is a long-term supporter of the startup ecosystem through the Orange Fab accelerator program designed to support entrepreneurs in the development of innovative products and their distribution locally and internationally.

Gold Partners

Silver Partners

Bronze Partner

HACKING VILLAGE PARTNERS

COMMUNITY & MEDIA PARTNERS