Activity
-
We keep talking about various attacks on #Kubernetes infrastructure, but the systematization of initial access vectors often gets lost in the noise…
We keep talking about various attacks on #Kubernetes infrastructure, but the systematization of initial access vectors often gets lost in the noise…
Liked by Kat Traxler
-
I’ve got this Ted Talk on cloud configuration obsession I need to get out, the eve of a holiday weekend seems like the perfect time……
I’ve got this Ted Talk on cloud configuration obsession I need to get out, the eve of a holiday weekend seems like the perfect time……
Liked by Kat Traxler
-
Dr. Nestori Syynimaa is showcasing token based authentication attacks, breaking down what to steal from the user's endpoint.
Dr. Nestori Syynimaa is showcasing token based authentication attacks, breaking down what to steal from the user's endpoint.
Liked by Kat Traxler
Publications
-
Attacks as a Service with The DeRF
DEF CON Cloud Village
Abstract:
Introducing the DeRF (Detection Replay Framework), a tool which hosts attack techniques and supports the invocation of those attacks across cloud environments. What sets DeRF apart from other cloud attack tools?
- User-Friendly Interface: Since the DeRF is hosted in Google Cloud, End Users can invoke attacks through the cloud console UI without the need to install software or use the CLI.
- Accessibility for Non-Security Professionals: The DeRF caters to a broad…Abstract:
Introducing the DeRF (Detection Replay Framework), a tool which hosts attack techniques and supports the invocation of those attacks across cloud environments. What sets DeRF apart from other cloud attack tools?
- User-Friendly Interface: Since the DeRF is hosted in Google Cloud, End Users can invoke attacks through the cloud console UI without the need to install software or use the CLI.
- Accessibility for Non-Security Professionals: The DeRF caters to a broad audience of End Users, including Engineering, Sales, Support Staff or automated processes.
- Robust OpSec: Long-Lived Credentials are not passed between operators, instead access to the DeRF and its attack techniques are controlled through GCP IAM Role-Based Access Control (RBAC)
- Extensibility at its Core: Attack sequences are written in YAML, enabling easy configuration of new techniques.
- Turn-Key deployment: Deploying (and destroying!) the DeRF is a fully automated process, completed in under 3 minutes.
During this demo, we will guide you through the straightforward and automated deployment process for the DeRF. We'll demonstrate how to invoke pre-configured attack techniques and illustrate how you can customize the framework to align with your internal attacker profile. By deploying the DeRF within your organization you can easily spin up attacker simulations, to augment training or automate the testing of detection capabilities. -
GCP Primitive Roles, An indictment
fwd:Cloudsec
Before Google Cloud released Cloud IAM there was only Primitive Roles. Prior to 2016, the course-grained Roles, Owner, Editor and Viewer were the only mechanisms available to grant access to GCP resources.
Primitive Roles are the antithesis to least privilege but more specifically, they’re mere existence significantly impacts the security posture of a GCP Project. Four years after the release of Cloud IAM, despite the availability of fine-grained Roles, Primitive Roles are still…Before Google Cloud released Cloud IAM there was only Primitive Roles. Prior to 2016, the course-grained Roles, Owner, Editor and Viewer were the only mechanisms available to grant access to GCP resources.
Primitive Roles are the antithesis to least privilege but more specifically, they’re mere existence significantly impacts the security posture of a GCP Project. Four years after the release of Cloud IAM, despite the availability of fine-grained Roles, Primitive Roles are still pervasive in GCP. Is it possible to eradicate Primitive Roles from your GCP Organization and still use the Platform? -
GCP Privileged Escalation - A Transitive Path
Overview
The power of Impersonation is a deeply rooted concept in GCP and GKE. The ability for one member to Impersonate another is a foundational capability; it will and should be leveraged as your cloud maturity grows. But how does your Organization securely enable Impersonation without leaving behind a 'Happy Path' for Attackers?
In this talk I will show you how an attacker could abuse permissions with Transitive properties to escalate their permissions in GCP starting from initial…Overview
The power of Impersonation is a deeply rooted concept in GCP and GKE. The ability for one member to Impersonate another is a foundational capability; it will and should be leveraged as your cloud maturity grows. But how does your Organization securely enable Impersonation without leaving behind a 'Happy Path' for Attackers?
In this talk I will show you how an attacker could abuse permissions with Transitive properties to escalate their permissions in GCP starting from initial compromise to Project Admin. I'll also talk about some 'Red Flag' permissions fueling privilege escalation and how to securely handle when there is a use case for them. -
The Cloud Attack Surface - Laughing at the OSI Model
BSidesMSP 2019
Security Professionals are comfortable reasoning about the security posture of systems within the framework of the OSI model. We classify attacks as network based or application based each with their own set of understood preconditions or rules.
Enter 'The Cloud' or I as like to think about it, platforms in other peoples datacenters. The Cloud API Platforms are used by a new bread of operations teams to define network or application systems in code. Its on the Cloud API Platform that…Security Professionals are comfortable reasoning about the security posture of systems within the framework of the OSI model. We classify attacks as network based or application based each with their own set of understood preconditions or rules.
Enter 'The Cloud' or I as like to think about it, platforms in other peoples datacenters. The Cloud API Platforms are used by a new bread of operations teams to define network or application systems in code. Its on the Cloud API Platform that a new attack surface has opened and it plays by none of the old rules. -
JAVASCRYPTO: HOW WE ARE USING BROWSERS AS CRYPTOGRAPHIC ENGINES
Cyphercon 2.0
In order to achieve end-to-end encryption, build zero-knowledge systems, and provide users with the convenience they are accustomed to, Web 2.0 is pushing cryptography to your browser. From secure e-mail to credit card transactions, our security is increasingly dependent on the integrity of client side javascript. The opportunities for exploit are many but with every new vulnerability has come a potential mitigation, all in an attempt to strong arm these sensitive operations into the browser…
In order to achieve end-to-end encryption, build zero-knowledge systems, and provide users with the convenience they are accustomed to, Web 2.0 is pushing cryptography to your browser. From secure e-mail to credit card transactions, our security is increasingly dependent on the integrity of client side javascript. The opportunities for exploit are many but with every new vulnerability has come a potential mitigation, all in an attempt to strong arm these sensitive operations into the browser, limit an applications liability, and keep us users happy. In my presentation, we will look at the fundamental nature of javascript, web browsers, and conclude what level of protection, in the best of circumstances, JavasCrypto affords the end user.
Projects
-
Crypto2020JS – Encryption for Future Governments
-
"TLA Compliance And You"
A JavaScript crypto library for future government.
Crypto2020JS provides for the implementation of the Stanford JavaScript Cryptographic Library while maintaining compliance with most Three-Letter Agencies (TLAs).
All sources of entropy derived from either a password or real time events will be overwritten by a fresh set of null values resulting in null keys,
salt and a consistent, static IV used in all modes of encryption.
Honors & Awards
-
Inaugural infallible Twister game in DEFCON history
Matt Edmondson
Part of a three way tie for first place in the inaugural game of inflatable Twister ever played in DEFCON history.
Organizations
-
ISACA-MN
-
- Present -
ISSA-MN
-
- Present -
OWASP - MSP
-
- Present
More activity by Kat
-
✨ My top 5 tips to survive re:Invent week ✨ 1. Bring Chapstick. Save your lips. This is the Mohave desert. 2. Bring a refillable water bottle and…
✨ My top 5 tips to survive re:Invent week ✨ 1. Bring Chapstick. Save your lips. This is the Mohave desert. 2. Bring a refillable water bottle and…
Liked by Kat Traxler
-
Day 1 and 2 at Black Hat MEA were nothing sort of amazing! As the event gears up for its final day, don’t miss your chance to: ✨ Connect with our…
Day 1 and 2 at Black Hat MEA were nothing sort of amazing! As the event gears up for its final day, don’t miss your chance to: ✨ Connect with our…
Liked by Kat Traxler
-
For those who didn't get a chance to see in person, my Defcon Cloud Village talk is out! Come take a look if you're interested in breaking and…
For those who didn't get a chance to see in person, my Defcon Cloud Village talk is out! Come take a look if you're interested in breaking and…
Liked by Kat Traxler
-
Imagine turning a cloud security tool into a weapon - Viktor Gazdag is currently revealing how Azure Policy, which organizations typically use to…
Imagine turning a cloud security tool into a weapon - Viktor Gazdag is currently revealing how Azure Policy, which organizations typically use to…
Liked by Kat Traxler
-
I’ve got this Ted Talk on cloud configuration obsession I need to get out, the eve of a holiday weekend seems like the perfect time……
I’ve got this Ted Talk on cloud configuration obsession I need to get out, the eve of a holiday weekend seems like the perfect time……
Shared by Kat Traxler
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Kat Traxler
1 other named Kat Traxler is on LinkedIn
See others named Kat Traxler