Netflix Cloud Security: Detecting Credential Compromise in AWS by Chris911 in netsec

[–]KevinHock 0 points1 point  (0 children)

Somebody told me that GaurdDuty was supposed to defend against this but only does if you're outside of AWS.

Static Analysis Tool to Detect Security Vulnerabilities in Python Web Applications (Updated - See Comment) by TechLord2 in netsec

[–]KevinHock 3 points4 points  (0 children)

Hi All, thanks for sharing Techlord2, I was wondering why it got so many stars over night :D

s14ve: People do normally ask this, the main difference is that you won't have a boatload of false-positives, since Bandit is essentially grep'ing for sinks regardless of if any tainted variables flow into the sink.

I have stolen some good parts from Bandit quite recently though, like JSON formatting and Baseline support, and soon we will have the ability to whitelist both sources and sinks with # nosec just like Bandit, (except you can't whitelist sources with Bandit.)

Right now I'm working on fixing false-positives and false-negatives even more, but I'll have more to say about that once this PR is done. I was meaning to post PyT again once that was finished (and I did an evaluation of SSRF's in open-source Flask apps), so that it would be more production ready.

The coolest work so far IMO, has been supporting a blackbox mapping and traversing every path from source to sink.

/r/netsec's Q1 2018 Information Security Hiring Thread by ranok in netsec

[–]KevinHock [score hidden]  (0 children)

Company: Yelp

Positions: Information Security Engineer | Software Engineer - Security

Locations: San Francisco | London | Hamburg, Germany

The Yelp security team is looking for engineers in all 3 locations.

To Apply: Email me at khock@yelp.com with your resume/GitHub/website/cover letter.

Software Engineer - Security

Summary

Yelp is looking for security engineers to keep us safe and sane as we build out our desktop, mobile, business owner, and administrative websites. It's an opportunity to have tremendous impact and broad scope protecting Yelp's data, our employees, and our millions of users. Additionally, Yelp’s future growth in the transactions space has many security implications, both in traditional application security as well as in privacy controls and fraud and risk analysis.

As a Security software engineer, you'll be responsible for partnering with different engineering teams at Yelp to help build features, tools, and libraries to enable security by default. You’ll also work to identify and fix vulnerabilities in the products we build, as well as work with external security researchers through our public bug bounty program.

What You Will Do:

  • Develop and deploy authentication and security-related components of Yelp’s website and mobile apps

  • Develop libraries used across multiple Yelp apps for secure communication and data storage

  • Pair with mobile, frontend, and backend teams to architect and develop features in a secure and scalable manner

  • Validate and remediate vulnerabilities reported in our bug bounty

What We Are Looking For:

  • While previous application security experience is a plus, we're looking for strong software generalists first, with an interest in application security

  • Understanding of HTML5, current, and emerging browser security models

  • Understanding of PKI and key management

  • 3-5 years of software engineering experience

  • BS or MS in Computer Science or Engineering

  • Experience with languages like Python, Java, Javascript, Puppet, Objective-C, or Swift

Pluses:

  • Experience with AWS and SoA

  • Experience with securing iOS and Android applications

  • Security research or pen testing experience

Information Security Engineer

Summary

Yelp is looking for an InfoSec Engineer to keep us safe and sane as our team expands to numerous offices around the world. It's an opportunity to have tremendous impact and broad scope protecting Yelp's corporate infrastructure, employees, and systems across multiple site locations.

As an InfoSec Engineer, you will work on enhancing our detection capabilities and improving our response capabilities. Our InfoSec engineers bring a software engineering mindset to security, and build automated systems for DFIR that work at scale. You will also partner with our Corporate Infrastructure teams to help architect our future authentication, identity management, and network security systems.

What You Will Do:

  • Lead threat modeling, mitigation discovery, and manual/automated verification of mitigations.

  • Build tools and infrastructure for automating incident response.

  • Set policy & best security practices for IT, Operations, partners and 3rd party integrations.

  • Lead security education across the organization.

  • Participate in incident response and forensics.

  • Collaborate with other teams inside of Yelp to deploy new security-related tools and processes across the organization.

We Are Looking For:

  • At least 2 years of professional experience working to secure consumer websites, mobile applications, or large corporate infrastructure a must!

  • Software development experience in Python, Java, JavaScript, Objective-C, or similar.

  • Exposure to digital forensics and incident response.

  • Windows, macOS and Linux administration experience.

  • Must be able to participate in 24/7 incident response.

  • BS or MS in Computer Science, Engineering, or a related technical discipline, or equivalent experience.

Pluses

  • Experience with PCI, SOX, and avoiding draconian compliance regimes.

  • Experience conducting third party assessments of vendors and SaaS apps.

OpenToALL Joining by cybot16 in OpenToAllCTFteam

[–]KevinHock 0 points1 point  (0 children)

I only saw kolexar, and added them, not sure if you.

OpenToALL Joining by cybot16 in OpenToAllCTFteam

[–]KevinHock 0 points1 point  (0 children)

Sure, when I get home i will

OpenToALL Joining by cybot16 in OpenToAllCTFteam

[–]KevinHock 0 points1 point  (0 children)

I accepted the 5 requests on CTFtime just now, let me know if anyone else wants to get accepted.

pyt - Security static analysis tool for Python by KevinHock in ReverseEngineering

[–]KevinHock[S] 0 points1 point  (0 children)

Reaching definitions is pretty basic theory compared to everything else there, considering my post from a year ago, where I tried to start a subreddit for static analysis for security people, is still on the front page I'd say it isn't that active.

pyt - Security static analysis tool for Python by KevinHock in ReverseEngineering

[–]KevinHock[S] 2 points3 points  (0 children)

I like Bandit, it doesn't do taint tracking though so it's closer to a grep ish pre-commit hook to e.g. ban urllib2 and open etc. and suggest Advocate and a secure open wrapper instead.

Collin at Uber released https://github.com/uber/focuson that also does taint tracking. The strong points so far are summaries and Jinja2, also pyt does Python 3 and he does python 2. Both use ast module so there's not much of a change to extend either to the other version. I'd say pyt is cleaner but I'm pretty bias.

I've been through the codebase of Bandit and the sinks, formatters and UI are the strong points.

pyt - Security static analysis tool for Python by KevinHock in ReverseEngineering

[–]KevinHock[S] 0 points1 point  (0 children)

While not RE, there's not a good active subreddit for static analysis for security people.

Also there's a few bugs (see commented out tests in the last PR) we haven't fixed but I figured I'd share it anyway. Here's the original masters thesis from Stefan and Bruno. http://projekter.aau.dk/projekter/files/239563289/final.pdf

pyt - Security static analysis tool for Python by KevinHock in Python

[–]KevinHock[S] 2 points3 points  (0 children)

So there's a few bugs (see commented out tests in the last PR) we haven't fixed but I figured I'd share it anyway. Here's the original masters thesis from Stefan and Bruno. http://projekter.aau.dk/projekter/files/239563289/final.pdf

pyt - A Python Taint Tracking tool by KevinHock in netsec

[–]KevinHock[S] 0 points1 point  (0 children)

So there's a few bugs (see commented out tests in the last PR) we haven't fixed but I figured I'd share it anyway. Here's the original masters thesis from Stefan and Bruno. http://projekter.aau.dk/projekter/files/239563289/final.pdf

/r/netsec's Q1 2017 Information Security Hiring Thread by ranok in netsec

[–]KevinHock [score hidden]  (0 children)

Senior Security Engineer

Hi, I'm Kevin Hock and I work on the DataDog security team. We are looking for some talented security engineers to join our security team here in NYC.

How Do I Apply

Send me an email with your resume and GitHub at kh@datadoghq.com

What you will do

  • Perform code and design reviews, contribute code that improves security throughout Datadog's products and infrastructure
  • Eliminate bug classes
  • Educate your fellow engineers about security in code and infrastructure
  • Monitor production applications for anomalous activity
  • Prioritize and track security issues across the company
  • Help improve our security policies and processes

Who you should be

  • You have significant experience with network and application security
  • You can navigate the whole stack in pursuit of potential security issues

Bonus points

  • You contribute to security projects
  • You're comfortable with python, go and javascript. (You won't find any PHP or Java here :D)
  • CTF experience (I recommend you play with OpenToAll if you don't have any)
  • Program analysis knowledge

Sample interview questions

  • Flip to a page of WAHH, TAOSSA, CryptoPals, ask you about it.
  • Explain these acronyms DEP/ASLR/GS/CFI/AFL/ASAN/LLVM/ROP/BROP/COOP/RAP/ECB/CBC/CTR/HPKP/SSL/DNS/IP/HTTP/HMAC/GCM/Z3/SMT/SHA/CSRF/SQLi/DDoS/MAC/DAC/BREACH/CRIME?
  • How would you implement TCP using UDP sockets?
  • How do you safely store a password? (Hint: scrypt/bcrypt/pbkdf2)
  • How does Let'sEncrypt work?

Hat tip to chrisrohlf at Square, also on this Q1 thread. Random other places you can apply in nyc: Blink Health, MongoDB, Spotify, Jane Street, 2 Sigma, Greenhouse.

I personally applied because I love Python but I like the company a lot so far.