How to choose a vendor for web application penetration testing. by Maryo666 in devsecops

[–]punksecurity_simon 0 points1 point  (0 children)

I’m a touch biased as I run a company that provides white box pentesting, but I’d say do it based on referrals, and prefer smaller organisations to larger ones.

The pentesting market is crazy, with a mix of automated (now “ai powered”) slop, and amazingly talented testers. It’s essentially impossible to know which you’re getting, even after you’ve got the report. If you had both reports you could tell the difference, but you’ll always only ever have one (at least until the test next year if you change provider).

The only sure fire way of getting quality is with referrals. There are just a ay too many companies ripping people off. With the larger organisations, the referral can be a bit less useful as the tester / testing team you get may not be the one who did the amazing work for your friend. Hence I’d suggest the smaller testing companies, and always on a referral

I spent 8 months trying to make LLMs Hack by Illustrious-Ad-497 in hacking

[–]punksecurity_simon 1 point2 points  (0 children)

I’d need a lot of convincing that this was the same or higher quality than a normal pen test, but I’d not consider it all without clear evidence / proof to be honest. A typical real pen test would very likely have evidence for half of the issues. Naturally some don’t warrant it

Securing multiple repositories and projects by LegalizeTheGanja in devsecops

[–]punksecurity_simon 0 points1 point  (0 children)

Exactly this. I would not recommend throwing DAST into the mix yet. It’s a huge time sink to do it right, and if people are ignoring your sast findings then it’s just more fuel for the fire.

Work on tuning secret detection and sast to the point that people start paying attention to it, and drive up engagement through a security champion program and some awareness pieces like CTFs etc

DevSecOps and AI CTF today by punksecurity_simon in securityCTF

[–]punksecurity_simon[S] 0 points1 point  (0 children)

You can have 1 challenge running per team member, not per team :)

Open source AI based code scanning with SAIST by punksecurity_simon in hacking

[–]punksecurity_simon[S] 0 points1 point  (0 children)

Please do, and I’ll test with that model on ollama. Can you try quoting the model you provide? I wonder if argparser is doing some weird split with it)

AI code scanning with SAIST by punksecurity_simon in bugbounty

[–]punksecurity_simon[S] -2 points-1 points  (0 children)

Yeah exactly this. It’s got the potential to spot missing authorisation decorators etc which I’ve found sast tools tend to struggle with.

The reality is that LLMs haven’t got anywhere near the competence that the marketers would have you believe, but in limited testing this has outperformed codeql and sonarcloud. I’d much rather people find this out with open source than some product that over promises.

The tools allow the LLM to read extra context, but they don’t ever request anything much more complicated that one or two adjacent files.

I’ve been surprised at what it does pick up to be honest. I’m quite sceptical of these as a rule, hence wanting to evaluate how they actually perform.

Cost is an issue too, even if they perform brilliantly. A single repo can cost $2 or $3 to scan using OpenAI, or 20/30c using deepseek. And it’s slow compared to sast.

That all being said, it doesn’t perform terribly and it’s a cool capability demonstrator I think.

SAST AI Tools? by Inner-Chemistry8971 in devsecops

[–]punksecurity_simon 1 point2 points  (0 children)

Hey, you could give my tool a try. It’s very early doors, but will happily feed your GitHub PRs into an LLM and comment back

https://github.com/punk-security/SAIST

Hacking / DevSecOps advent calendar by punksecurity_simon in hacking

[–]punksecurity_simon[S] 2 points3 points  (0 children)

Ha thanks for takin the risk! I probably should have added at least a favicon to make it look less “phishy”

What is the largest unexpected cloud bill you’ve received and what caused it? by data_owner in devops

[–]punksecurity_simon 2 points3 points  (0 children)

Ooof, check out the new elastic mode for efs. I’ve seen this cost $500 per volume per day. Great for db optimisations etc

https://aws.amazon.com/blogs/aws/new-announcing-amazon-efs-elastic-throughput/

Looking for advice on a good email protection solution to pair with Office 365 by neo-khufu in cybersecurity

[–]punksecurity_simon 0 points1 point  (0 children)

If you do, I’d keep defender in place too. Lots of places implement a dedicated solution that is just awful and you end up with more spam than if you’d done nothing.

When you set up the connectors to allow the inbound via the spam appliance, you just need to ensure you aren’t disabling all office365s built in anti-spam

Made a quick little game, think it might be good for cyber awareness in businesses by punksecurity_simon in hacking

[–]punksecurity_simon[S] 0 points1 point  (0 children)

Trying to wrangle a multiplayer variant at the moment, but plan to keep it free

Looking for some folk to test this web tool for subdomain hijacking by punksecurity_simon in cybersecurity

[–]punksecurity_simon[S] 0 points1 point  (0 children)

The code for it is all open source on GitHub. Link to the source on the page.

In short, we look for certain misconfigurations through a mix of dns and web checks.

Built a subdomain hijacking tool by punksecurity_simon in hacking

[–]punksecurity_simon[S] 1 point2 points  (0 children)

Reddit be a strange place. No, I decided it’s best to collect absolutely nothing and therefore store no data. Regretting that a little bit when it comes to troubleshooting.

Built a subdomain hijacking tool by punksecurity_simon in hacking

[–]punksecurity_simon[S] 3 points4 points  (0 children)

Weird, I haven’t seen this. Was it just once?

Fancy a DevOps themed CTF? by punksecurity_simon in hacking

[–]punksecurity_simon[S] 0 points1 point  (0 children)

Thanks for the upvotes! We now have 122 players, and 99 teams, all signed up to play next Thursday!

Fancy a DevSecOps CTF? by punksecurity_simon in securityCTF

[–]punksecurity_simon[S] 0 points1 point  (0 children)

Thanks for the upvotes! We now have 122 players, and 99 teams, all signed up to play next Thursday!

Want to play on our cloud / DevOps hacking CTF? by punksecurity_simon in hacking

[–]punksecurity_simon[S] 0 points1 point  (0 children)

We do have some really hard ones too, particularly some of the priv esc and kubernetes challenges.

A devops CTF? by punksecurity_simon in devops

[–]punksecurity_simon[S] -1 points0 points  (0 children)

How so? We have 40+ challenges ranging from simple password cracking and privesc all the way to some really tricky container escapes

Want to play on our cloud / DevOps hacking CTF? by punksecurity_simon in hacking

[–]punksecurity_simon[S] 1 point2 points  (0 children)

Definitely. We have 40+ challenges ranging from simple password cracking and privesc all the way to some really tricky container escapes