Connecting With the Community at BSides Atlanta 2023
Dive into BSides Atlanta 2023, the largest free security event in the South! Explore insights from top security professionals on Web 3.0, cloud vulnerabilities, and more.
Join the DZone community and get the full member experience.
Join For FreeAtlanta's Hartsfield-Jackson International Airport is the busiest in the world, serving over 93 million passengers to and from this international destination last year. There are many reasons to visit Atlanta, such as seeing the home of Coca-Cola, visiting the birthplace of Dr. Martin Luther King, Jr., or taking in a Braves game. But none of those reasons were why over 500 security professionals gathered at the Kennesaw State University Center. They gathered to share their knowledge and experiences defending their organizations and teams at BSides ATL 2023.
In the opening remarks, we learned this was the largest free BSides in the south, welcoming just over 500 attendees, vendors, speakers, and volunteers. Folks had a lot of programming options, including four speaking tracks, a lock pick village, and a network hacking 'king of the hill' capture the flag.
Here are just a few highlights from this community-led event.
Separating Your Security Work and Your Personal Life
In her opening keynote, Sherrod DeGrippo, Director of Threat Intelligence Strategy at Microsoft, began by talking about logging and ended with a call to action for all security professionals to guard their happiness. She said we are threat hunters professionally and are trained to use tools like Wireshark, Splunk, and Cuckoo Sandbox to examine traces left behind by malicious actors. We are experts at finding broken and insecure locks and system flaws that hackers with bad intentions can exploit. Psychologically, this trains our brains to reward us with an emotional high when we find an issue. As she summed it up, we get to a place where we "find something bad, we feel good." And there is a lot of bad to find.
While this 'detect and reward' cycle is useful professionally, it can have serious negative effects on our home and personal lives. She explained that if you start applying your hunting techniques to people in your private life, you will likely have some very bad outcomes. She reminded the audience that Zero Trust is only for systems and machines. With people, we should generally apply "trust, but verify." Assuming bad intent from our friends and family leaves us with paranoia and mistrust of everyone.
In his talk "Unchained: Unraveling the Unconventional Security Threats in Web3," Nick Kammerdiener, Senior DevSecOps Engineer at Hypergiant, asked us to think about the problems presented in blockchain and what we can do about them. There are a lot of use cases for Web 3.0, also commonly described as Web3 or blockchain technology, from cryptocurrency to public records where individuals can control their own data. There has been a lot of hype around this way of building decentralized systems, but like AI, many projects come from conversations with non-technical leaders that sound like, "We don't know what Web3 is, but we know we need it."
This has led to a few issues, according to Nick. He spelled out three areas of concern for Web 3.0 security.
- Insecure development practices
- Known issues with common services
- Network attacks
First, developers are struggling to keep up with the tech, leading to a lot of copy and paste from examples that were not written with security in mind. His work commonly finds firewalls left completely open or a complete lack of authentication for components. He also warned against open-sourcing the internal code a company would rely on in production, as it shows where patching is lacking and helps attackers understand the vulnerabilities they can exploit. If you do open-source your code, it is vital to embrace an aggressive patching strategy.
Next, many common services, such as the foundational Interplanetary File System, IPFS, and Ceramic, a decentralized DB, present some security issues when deployed using default settings. Attackers are well aware of these flaws. The most common is that the admin interface for IPFS is always available on port 5001. Currently, there is no built-in mechanism offering port protection., meaning that unless you put your own security measures in place to guard access, anyone who can access that port can assume complete administrative control.
While every network, regardless of the technology it is using, is susceptible to attacks, Web3 systems are regularly targeted by three types of attack:
- 51% attacks where a group who can gain a simple majority of a network's mining resources can rewrite the whole blockchain.
- Sybil attacks where an attacker creates many identities to manipulate a network.
- Replay attacks where a legitimate transaction is recorded and rebroadcast in order to assume the original user's identity and steal access.
It is not all bad news; fortunately, these types of attacks are straightforward to guard against. Platforms like Cloudflare can be used to block ports and offer tunneling. A tunnel can offer DDoS protection and block all bot traffic at scale. You can also set rules to look for and block single IPs, making a high number of requests.
Published at DZone with permission of Dwayne McDaniel. See the original article here.
Opinions expressed by DZone contributors are their own.
Comments