DjangoCon US 2018 - Unique ways to Hack into a Python Web Service by Tilak T

Channel:
Subscribers:
42,400
Published on ● Video Link: https://www.youtube.com/watch?v=Lf0yL_nNGOk



Duration: 43:18
26 views
1


DjangoCon US 2018 - Unique ways to Hack into a Python Web Service by Tilak T

Python covers a significant portion of the present day Web services landscape because of frameworks like Django, Flask, CherryPy etc. Many Highly Scalable services are built on one or more of these frameworks.

However, there is a perception among developers that these frameworks protected all classes of Web attacks and the OWASP Top 10 vulnerabilities. This is because of the inherent middleware that has battle-tested controls against some common vulnerabilities like CSRF, SQL Injection, and XSS. However, I have observed that many Python devs do not watch out for lesser-known vulnerabilities that seem to be rife in many Python Web Apps. For instance, in more recent security tests against Python Web Services that our team executes, I find that vulnerabilities like Insecure Deserialization, XML External Entities, Server-Side Template Injection and Authorization Flaws are quite prevalent.

As a developer (largely of Python Web Apps), I find that there are some simple steps that engineering teams can take towards finding and fixing such vulnerabilities with Python Web Services built on Django and Flask. My talk is meant to be a holistic perspective on finding and fixing some uncommon flaws in Python Web Apps. The talk will be replete with multiple demos, anecdotes, and examples of secure and insecure code in Python. I will also delve into SAST and DAST techniques (AST and ZAP Custom Scripts) to identify such flaws in python web applications.

The example repository will be available on GitHub for the community to use.




Other Videos By Confreaks


2022-04-08Chain React 2018: Machine Learning and React Native by Ray Deck
2022-04-08Chain React 2018: Learning React Native as a Junior Engineer by Erin Fox
2022-04-08Chain React 2018: Detox: A year in. Building it, Testing with it by Rotem Mizrachi-Meidan
2022-04-08Chain React 2018: From Sketch to Code: Designing a Component Kit by Samantha Bretous
2022-04-08Chain React 2018: Debugging and Beyond with Reactotron by Darin Wilson
2022-04-08Chain React 2018: All Together Now by TC Davis
2022-04-08Chain React 2018: Simply React by Kent C. Dodds
2022-04-08DjangoCon US 2018 - Real Life Accessibility: Have you HEARD your site? by Mike Herring
2022-04-08DjangoCon US 2018 - Bespoke Communication Devices for Kids with Autism... by Muriel Green
2022-04-08DjangoCon US 2018 - How to give a damn, and stand out by Amber Wanner
2022-04-08DjangoCon US 2018 - Unique ways to Hack into a Python Web Service by Tilak T
2022-04-08DjangoCon US 2018 - Pseu, Pseu, Pseudio. Pseudonymization in Django. by Frank Valcarcel
2022-04-08DjangoCon US 2018 - Anatomy of Open edX - a modern online learning platforms... by Nate Aune
2022-04-08DjangoCon US 2018 - "State of Django" Panel by Simon Willison
2022-04-08DjangoCon US 2018 - The Power of GeoDjango by Anna Kiefer
2022-04-08DjangoCon US 2018 - Data internationalization in Django by Raphael Michel
2022-04-08DjangoCon US 2018 - ORM: The Sequel by Katie McLaughlin
2022-04-08DjangoCon US 2018 - Strategies for Zero Down Time, Frequent Deployments by Nick Humrich
2022-04-08DjangoCon US 2018 - Lightning Talks Day 3
2022-04-08DjangoCon US 2018 - Easier Classes: Python Classes Without All The Cruft by Trey Hunner
2022-04-08DjangoCon US 2018 - Django REST Framework: Moving Past the Tutorial to Production by Drew Winstel