dependency-track
WebGoat
dependency-track | WebGoat | |
---|---|---|
18 | 41 | |
2,335 | 6,517 | |
3.1% | 1.1% | |
9.8 | 8.7 | |
3 days ago | 6 days ago | |
Java | JavaScript | |
Apache License 2.0 | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
dependency-track
-
Show HN: Pre-alpha tool for analyzing spdx SBOMs generated by GitHub
I've become interested in SBOM recently, and found there were great tools like https://dependencytrack.org/ for CycloneDX SBOMs, but all I have is SPDX SBOMs generated by GitHub.
I decided to have a go at writing my own dependency track esque tool aiming to integrate with the APIs GitHub provides.
It's pretty limited in functionality so far, but can give a high level summary of the types of licenses your repository dependencies use, and let you drill down into potentially problematic ones.
Written in NextJS + mui + sqlite, and using another project of mine to generate most of the API boilerplate/glue (https://github.com/mnahkies/openapi-code-generator)
-
SQL Injection Isn't Dead Yet
To detect these types of vulnerabilities, we should first and foremost know our dependencies and versions, and which of them have vulnerabilities. The OWASP Top 10 2021 identifies this need as A06:2021-Vulnerable and Outdated Components. OWASP has several tools for this, including Dependency Check and Dependency Track. These tools will warn about the use of components with vulnerabilities.
- Dependency-Track
-
Krita fund has 0 corporate support
https://dependencytrack.org/
You just need to use one of the various tools out there to scan.
-
Friends - needs help choosing solution for SBOM vulnerability
OWASP Dependency Track - https://dependencytrack.org/
-
An Overview of Kubernetes Security Projects at KubeCon Europe 2023
Dependency-Track
-
software inventory of my ECS tasks
I actually want to build the same thing you are after, and I think I’ll go for the setup you describe in idea 2. The tool you can use for this is Trivy (https://trivy.dev), have it generate a SBOM and send it to Dependencytrack (https://dependencytrack.org).
-
The ultimate guide to Java Security Vulnerabilities (CVE)
If you like Dependency-Track, consider moving to Dependency-Track ( https://dependencytrack.org ), which makes administration much easier.
-
Is there any news about 64 bit Steam?
Even if you roll up the sleeves and add the feature yourself there is no guarantee it will be accepted upstream and you should always be prepared for the possibility of wasting time.
-
The SBOM Frenzy Is Premature
I don't quite understand the deployment issue. I mean, I understand people might not be tracking what's deployed, but I don't understand what is missing for it to be happening today, other than will.
For example: I build some software into a Docker image, version tag it, sign it, and generate an SBOM for it. That image goes into production with signature validation. Even if I've included 100 jar files in there, I should know exactly which ones I have. I can upload the SBOM to my DependencyTrack[1] instance to so over time no dependencies have vulnerabilities I'm not aware of.
What doesn't work in that scenario? What scenarios can't conform to that one?
[1] https://dependencytrack.org
WebGoat
-
SQL Injection Isn't Dead Yet
WebGoat and Juice Shop are two "deliberately insecure" applications containing hundreds of security vulnerabilities for you to find and exploit, including SQL injections. Both projects provide extensive educational material to guide you.
-
Build and Push to GAR and Deploy to GKE - End-to-End CI/CD Pipeline
Click Save and then Run. If your codebase doesn’t have an OWASP critical bug, the pipeline should execute successfully. To enforce a fail on this OWASP scan, use a codebase with known vulnerabilities like WebGoat and you’ll see the OWASP scanner in action.
-
If you're looking for resources pertaining to hands-on practical demonstrations of learned skills and tools/techniques, look no further.
There's also a bunch of intentionally vulnerable Webapps and VMs aimed at demonstrating potential footholds and common exploits leading to owning of the host including but not limited to: bWAPP, Damn Vulnerable Web App, WebGoat, Metasploitable 3, Mutillidae, Juice Shop
-
Learning pentesting etc labs provided by courses.
Bro, i recommend you to create your own labs using vmware or virtualbox. There are so many VM images out there that was created for educational purposes. For example https://www.vulnhub.com/ has multiple VM images. You can test your skill by downloading and importing to your Virtual platform. Also, take consider to solve all problems in WebGoat and DVWA images.
- Looking for an online web app similar to DVWA
-
Skipping A+ and going straight for Sec +....mistake?
I highly recommend studying for more than just the cert. Get comfortable with cybersecurity itself. My biggest recommendation would be WebGoat. This also works great alongside studying for the sec+. https://owasp.org/www-project-webgoat/ Completely free and intentionally built to be insecure and help you learn and apply security concepts and use security tools. Also try https://tryhackme.com/ -> Both free.
-
WebGoat 2023.4 Hijack a session
I'm using latest version which you can find at https://github.com/WebGoat/WebGoat/releases/tag/v2023.4
- Updated system necessary if SSH access is limited?
- Oh, I'm about ready to say F* you IT and go be a goat farmer.
-
DON'T ROLL YOUR OWN CRYPTO
If you want to learn more check out the following resources: - OWASP top 10 (common security issues and what to do about them): https://owasp.org/www-project-top-ten/ - webgoat (pentest training): https://owasp.org/www-project-webgoat/ - https://safestack.io/ - really good software security training (I had in person training from them before their online resources were available, but haven't tried the online courses myself) - My personal favourite book on crypto is Applied Cryptography by Wiley, but I'm not a cryptographer, just an engineer - If anyone has more beginner-friendly resources then please comment
What are some alternatives?
trivy - Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
juice-shop - OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
DependencyCheck - OWASP dependency-check is a software composition analysis utility that detects publicly disclosed vulnerabilities in application dependencies.
DVWA - Damn Vulnerable Web Application (DVWA)
scancode-toolkit - :mag: ScanCode detects licenses, copyrights, dependencies by "scanning code" ... to discover and inventory open source and third-party packages used in your code. Sponsored by NLnet project https://nlnet.nl/project/vulnerabilitydatabase, the Google Summer of Code, Azure credits, nexB and others generous sponsors!
kubernetes-goat - Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀
gitlab
Lightning-Network - List of Lightning Network technical issues, bugs, flaws, and exploits.
sbt-dependency-check - SBT Plugin for OWASP DependencyCheck. Monitor your dependencies and report if there are any publicly known vulnerabilities (e.g. CVEs). :rainbow:
wrongsecrets - Vulnerable app with examples showing how to not use secrets
ort - A suite of tools to automate software compliance checks.
PomPom-Language - The cuteness implementation of a dependently typed language.