I recently spoke at TConf 2017, an Australian quality assurance conference about how bug bounty programs can be a great control to reduce security issues within your web applications. It covered how to run a bug bounty program, their pro’s and con’s and an update on seek.com.au’s program including a show and tell of a few recent bugs that have been reported! This was a slightly updated and shortened talk to the one i presented at NDC 2017 this year.
I recently spoke at NDC Sydney 2017, an Australian developer conference about how bug bounty programs can be a great control to reduce security issues within your web applications. It covered how to run a bug bounty program, their pro’s and con’s and an update on seek.com.au’s program including a show and tell of a few recent bugs that have been reported!
Defending web and mobile applications against the bad guys has always been hard, there is no escaping that fact. However it doesn’t seem to be getting any easier either. Evolving development practices (Agile, DevOps, CD/CI, IaC) have a big part to play, but there are several other trends that are also not helping the situation. So in this modern world of development, how can we better secure these applications?
The short answer is we need to change the way we approach application security, by designing an application security programme or secure software development lifecycle (SSDLC) that fits better into these evolving development practices…
I spoke about the pro’s and con’s of bug bounty programs with Mike at CrikeyCon 2017. This is a community-led conference targeting those with an interest in information security around South East Queensland and beyond.
I presented at OWASP AppSec Day 2016, an event run by the OWASP Melbourne Chapter (me!) designed to spread application security knowledge to the general tech community through talks and workshops.
I presented a slightly updated from DDD Sydney deck at DDD Melbourne about what motivates hackers to break into systems and how you could approach securing your company’s web application at scale. DDD Melbourne is a non profit community event in Melbourne run by developers for developers.
I presented on bug bounty programs at an Infrastructure Coders event in Melbourne. The meetup is focused on Infrastructure (DevOps) and is designed for Systems Administrators, Developers, DevOps, Web Operations Engineers and all people who build high traffic websites.
At WAHCKon Perth 2015 an information security conference held in Perth Australia, i presented on how to brake common Android binary protections like root detection and SSL pinning.
When performing a penetration test on an Android or iOS application the developer can implement what are called binary protections that hinder an attacker from easily analysing an application. Some of the more common protections are SSL pinning, code obfuscation and root detection. This article explains how to bypass the latter, namely root detection on Android.