Skip to content
GitLab
Explore
Sign in
Register
Primary navigation
Search or go to…
Project
B
blog
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Wiki
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Build
Pipelines
Jobs
Pipeline schedules
Artifacts
Deploy
Releases
Package registry
Model registry
Operate
Environments
Terraform modules
Monitor
Incidents
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
nimrod
blog
Compare revisions
29a5c774fcfc1ee95173caeccc49b598e37b2359 to b0ec9f13e625bf250aa5cbec2eeb9fa1b11052b9
Compare revisions
Changes are shown as if the
source
revision was being merged into the
target
revision.
Learn more about comparing revisions.
Source
nimrod/blog
Select target project
No results found
b0ec9f13e625bf250aa5cbec2eeb9fa1b11052b9
Select Git revision
Swap
Target
nimrod/blog
Select target project
nimrod/blog
1 result
29a5c774fcfc1ee95173caeccc49b598e37b2359
Select Git revision
Show changes
Only incoming changes from source
Include changes to target since source was created
Compare
Commits on Source (2)
pre-commit: Autoupdate hooks.
· 4d44d1ba
nimrod
authored
5 months ago
4d44d1ba
New post on security researchers.
· b0ec9f13
nimrod
authored
5 months ago
b0ec9f13
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
.pre-commit-config.yaml
+10
-10
10 additions, 10 deletions
.pre-commit-config.yaml
content/security-researchers.rst
+111
-0
111 additions, 0 deletions
content/security-researchers.rst
with
121 additions
and
10 deletions
.pre-commit-config.yaml
View file @
b0ec9f13
---
repos
:
-
repo
:
https://github.com/pre-commit/pre-commit-hooks
rev
:
v
4.2
.0
rev
:
v
5.0
.0
hooks
:
-
id
:
check-executables-have-shebangs
-
id
:
check-merge-conflict
...
...
@@ -10,25 +10,25 @@ repos:
-
id
:
trailing-whitespace
-
repo
:
https://github.com/Yelp/detect-secrets
rev
:
v1.
2
.0
rev
:
v1.
5
.0
hooks
:
-
id
:
detect-secrets
exclude
:
Pipfile\.lock|\.rst$
-
repo
:
https://github.com/adrienverge/yamllint
rev
:
v1.
26.3
rev
:
v1.
35.1
hooks
:
-
id
:
yamllint
-
repo
:
https://github.com/amperser/proselint/
rev
:
0.1
0.2
rev
:
0.1
4.0
hooks
:
-
id
:
proselint
types
:
[
plain-text
]
exclude
:
LICENSE
-
repo
:
https://github.com/ambv/black
rev
:
2
2.3
.0
rev
:
2
4.10
.0
hooks
:
-
id
:
black
args
:
...
...
@@ -42,12 +42,12 @@ repos:
args
:
[
--allow-raw
]
-
repo
:
https://github.com/myint/rstcheck.git
rev
:
v6.
1.1
rev
:
v6.
2.4
hooks
:
-
id
:
rstcheck
-
repo
:
https://github.com/PyCQA/prospector
rev
:
v1.
9.0
rev
:
v1.
13.3
hooks
:
-
id
:
prospector
args
:
...
...
@@ -74,7 +74,7 @@ repos:
-
pyroma
-
repo
:
https://github.com/pycqa/flake8.git
rev
:
3.9.2
rev
:
7.1.1
hooks
:
-
id
:
flake8
args
:
...
...
@@ -84,11 +84,11 @@ repos:
-
flake8-bugbear
-
repo
:
https://github.com/executablebooks/mdformat.git
rev
:
0.7.1
4
rev
:
0.7.1
9
hooks
:
-
id
:
mdformat
-
repo
:
https://github.com/codespell-project/codespell.git
rev
:
v2.
1
.0
rev
:
v2.
3
.0
hooks
:
-
id
:
codespell
This diff is collapsed.
Click to expand it.
content/security-researchers.rst
0 → 100644
View file @
b0ec9f13
My experience with security researchers
=======================================
:date: 2024-11-29
:summary: My experience with security researchers.
I've been sitting on this blog post for a long while. I have a history of
working with (so called) security researchers that I would describe as poor. I
don't want to besmirch the profession of security research. I enjoy reading
security research write ups, I follow a lot of the security best practices, I
subscribe to the security mailing lists of the OSes I use and overall have high
regard for the professionals in the field.
On the other hand, over my career I have many different interactions with
security companies and researchers working in those companies that have all
been bad. I worked at a cyber security company along side security researchers
from the IDF's 8200 unit. I received notices on security vulnerabilities on
sites I or the companies I work at run (especially after publishing a
``security.txt`` policy). But best of all is my experience with the Israeli
National Cyber Directorate. Let me get started.
Security audits and certifications
----------------------------------
A few of the companies I worked at went through security audits to get a
certification (SOC2 or HIPAA). As the person responsible for the
infrastructure and our CI/CD pipelines I was a part of the audit from beginning
to end and when the audit report was delivered, I addressed some of the
findings. From the few audits I took part in, I can say that the worst was a
company that ran a few automated scanners in the vein of `SSL Test
<https://www.ssllabs.com/ssltest/>`_ and the better ones ran something akin to
`Semgrep <https://github.com/semgrep/semgrep>`_ and maybe checking the OWASP
top 10.
All of the audits I've been part of had not produced any worthwhile results.
No actual vulnerabilities were ever found and most the time a few publicly
available security scanners were used (the screenshot from the SSL Test is
still vivid in my mind).
Working with security researchers
---------------------------------
I worked at a cyber security company with an actual cyber security product.
There we had a security research team with people from the IDF 8200 unit. From
my dealings with them, they have poor knowledge of things you would expect (on
the level of not knowing the difference between symmetrics and asymmetric
encryption) and their research can boiled down to running Nmap and Metasploit.
When one of them learned that I run my own mail server, he claimed to be able
to break in to my server. I said go for it, hoping to learn something new and
fix whatever vulnerability my server may have. Looking over his shoulder, I saw
that he was running Metasploit with a preset for mail servers. Having found
nothing (not because I'm that good, I just install security updates and have
sane settings) he turned quiet.
The Israeli National Cyber Directorate
--------------------------------------
I saved the best for last, the reason I felt the urge to write this post. Over
the last 3 or 4 years I was contacted 3 times by the INCD to let me know of
vulnerabilities they found in my personal sites and services.
The first time I was contacted by phone. I was a little surprised and took the
matter seriously. I was told that my mail server had an RCE. Asking for
details, I was told the CVE and the person on the other end explained to me
that I need to update my mail server. I quickly checked the CVE and I found
that Debian had backported the patch but the server version stayed the same (or
maybe some suffix was added, I don't remember). I tried to explain that I had a
patched server but it fell on deaf ears and they were adamant that the version
I was using vulnerable and I had to update ASAP. I thanked them for letting me
know and promised to look in to it.
The second time I was again contacted by phone. This time I was less surprised.
I was told that my GitLab instance was misconfigured, although it required
logging in, repositories were exposed through the `/explore
<https://git.shore.co.il/explore>`_ URL. I explained that it was deliberate,
that I develop opensource software and that is were I store it and make it
available for others (if you take a look, all of the repositories have an
opensource license and my blog even links to them). Again, it didn't convince
the person on the other side. I thanked them for letting me know and promised
to look in to it.
The third time I was again contacted by phone. This time I was not a bit
surprised. I was told that my SSH server is vulnerable and I have to update it.
I explained that I am running OpenSSH on an OpenBSD machine and that the
vulnerability in question only happens on Linux machines. The person on the
other end didn't know what OpenBSD is (I tried explaining that the developers
of OpenBSD also develop OpenSSH, they didn't seem to get it). Showing my age, I
complained that this is a waste of the taxes I pay. The person on the other end
didn't appreciate it and ended the call.
Closing thoughts
----------------
When I was growing up and the internet was becoming accessible to everyone a
new phenomenon named script kiddies started. People scanning ports, open
Windows shares and guessing SSH usernames and passwords. Then somebody got the
bright idea of making a career out of it by selling people some scary stories
and exaggerating their own capabilities and calling it security research. While
true that there are unpatched and vulnerable machines on the internet, this is
not security research and because I have sensible security practices I only
encountered false positives due to rudimentary scanners flagging my servers as
vulnerable without checking if they are indeed vulnerable.
I don't remember which company it was, but I remember one such company had an
realtime map of the internet showing realtime attacks. Looking closely, each
ping and each new connection to port 22 was an attack. The field is now filled
with charlatans that instead of trying to break in to your servers now try to
bill you for running Nmap or verifying your DMARC record. They've turned this
in a very successful industry and the Israeli government seems to have fallen
to this trap as well (as I'm pretty sure other goverments have as well).
This diff is collapsed.
Click to expand it.