white2hack 📚
12.4K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://t.iss.one/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
Создание виртуальной машины Ubuntu в Яндекс облаке, Николай Мищенков (Stepik), 2025

Пошаговая инструкция для создания виртуальной машины на базе дистрибутива Ubuntu 24.04 в Яндекс облаке

Преподаватель - Николай Юрьевич Мищенков. Занимал должность CTO of Data Center в AS Balticom. В компании OptiBet мы развернулись в GKE через Terraform. Внедрение практик GitOps дало нам чёткое понимание что происходило с нашей инфраструктурой.

❗️Официальный сайт
⛳️Скачать с облака

#education #SecDevOps
CloudSecDocs by Marco Lancini

A website collecting and sharing technical notes and knowledge on cloud-native technologies, security, technical leadership, and engineering culture

❗️Official page

📌 GitHub

#SecDevOps
DevSecOps в облачном CI/CD, Яндекс Практикум совместно с Hilbert Team, 2024

Бесплатный курс

4 модуля с теорией и практикой, свидетельство об окончании курса

Курс будет полезен практикующим DevOps‑инженерам уровня Middle и выше

Мы не учим вас профессии, а на практике знакомим с методологией DevSecOps. Вы расширите ваши CI/CD‑пайплайны специализированными сканерами и анализаторами, чтобы обезопасить свои приложения.

📌Начать изучать

#SecDevOps #education
DevSecOps using GitHub Actions: Secure CICD with GitHub by A Security Guru, Raghu The Security Expert, 2024

Build Secure DevOps Pipelines with GitHub Actions and integrate SAST, DAST, SCA security tools in the Pipeline

This DevSecOps course is designed for Security Engineers, DevOps Engineers, SRE, QA Professionals and Freshers looking to find a job in the field of security. This is a focused DevSecOps course with a special focus on integrating SAST/DAST/SCA tools in Build pipeline.

❗️Official page

#education #SecDevOps
The Complete DevSecOps Course with Docker and Kubernetes, Udemy (Stefan Toshkov Zhelyazkov), 2024

Master Apparmor, Clair, Quay, Anchore, Swarm, Portainer, Rancher, KubeBench, Prometheus and more for DevOps security

This course is a complete step by step guide for implementing best security practices and tools on your DevOps framework. You will start from the very basics by exploring the DevOps architecture and how it is related to DevSecOps. The you will learn the two main container management platforms: Docker and Kubernetes. You will master container management, working with Docker files, getting and building your own container images and optimizing them.

In the rest of the sections you will master the implementation of the extra security layer on your DevOps tools. Firstly, you will learn how to use the Docker Registry and build a registry on your own. I will show you how to use Docker Content Thrust and protect your docker daemon and host by applying Apparmor and Seccomp security profiles, implementing Docker Bench Security and and auditing the your Docker host. You will also learn how to protect and analyze vulnerabilities your docker images to prevent corruption using Clair, Quay, Anchore and the CVE database. You will explore how to create and manage Docker secrets, networks and port mapping. You will be able to use security monitoring tools such as cAdvisor, Dive, Falco and administration tools such as Portainer, Rancher and Openshift.

❗️ Official page
📌 GitHub

#education #SecDevOps
The small collection video tutorials of AWS Security (theory and practices with Demo)

Amazon Web Services, Inc. (AWS) is a subsidiary of Amazon that provides on-demand cloud computing platforms and APIs to individuals, companies, and governments, on a metered, pay-as-you-go basis.

Theory Introducing:

📌 AWS Security Specialty Certification Full Course by Computer Networks Decoded , 2023
📌 AWS Security Specialty Certification by , 2022
📌 Brief AWS Security Services by Great Learning, 2022
📌 AWS Cloud Security Foundations Test with Answersr by Anand K, 2023

Practical Tutorials:
📌 AWS Security Videos | Learn with Demo by LearnCloud, 2017/2020
📌 AWS VPC Tutorial Videos by Simplilearn, 2024
📌 AWS Security Tutorial / Security Crash by MLOps School, 2022

#education #SecDevOps
Certified Kubernetes Security Specialist (CKS) Study Guide by Benjamin Muschko, 2025

If you're preparing for the CKS exam📘 or looking to deepen your understanding of Kubernetes security, this book is a must-read. It provides:

In-depth coverage of the CKS curriculum:
📌 Real-world scenarios and use cases to understand attack vectors and mitigation
📌 Hands-on examples for tools like kube-bench, Trivy, Falco, and AppArmor
📌 Guidance on securing the supply chain, hardening the system, and monitoring runtime security

#book #SecDevOps #exam
Attacking CI/CD by Reza (DevSecops Giudes), 2025

In CI/CD (Continuous Integration/Continuous Deployment) environments, several methods and attacks can compromise security. Code Injection involves injecting malicious code into the build pipeline, exploiting vulnerabilities in the build system or dependencies, potentially leading to the execution of unauthorized commands or access to sensitive data. Dependency Attacks target vulnerabilities in third-party libraries or dependencies used in the CI/CD pipeline, exploiting them to introduce malicious code or cause failures. Artifact Tampering manipulates the build artifacts (e.g., binaries, containers) to include malicious payloads or vulnerabilities, which can be deployed to production systems. Pipeline Hijacking involves gaining unauthorized access to the CI/CD environment to alter build configurations, steal secrets, or inject malicious code into the pipeline.

Credential Exposure occurs when sensitive credentials or secrets (e.g., API keys, tokens) are hardcoded or improperly managed, making them accessible to attackers who can use them to gain unauthorized access. Phishing and Social Engineering tactics target developers or CI/CD administrators to trick them into revealing access credentials or executing malicious commands. Denial of Service (DoS) attacks can overwhelm CI/CD systems, disrupting the build and deployment processes. Misconfiguration of CI/CD tools and environments can inadvertently expose systems or data, leading to potential security breaches. Each of these methods requires vigilant security practices, including secure coding, regular dependency audits, and robust access controls, to mitigate risks in CI/CD workflows.

CI Debug Enabled;
Default permissions used on risky events;
Github Action from Unverified Creator used;
If condition always evaluates to true;
Injection with Arbitrary External Contributor Input;
Job uses all secrets;
Unverified Script Execution;
Arbitrary Code Execution from Untrusted Code Changes;
Unpinnable CI component used;
Pull Request Runs on Self-Hosted GitHub Actions Runner;
Mitigation Strategies;
Example GitHub Actions Workflow;
RCE via Git Clone;
Resources

See also:
📌 Attacking and Securing CI/CD Pipeline by Hiroki Suezawa, October 20, 2021

#SecDevOps
Attacking Pipeline by Reza (DevSecops Giudes), 2025

DevOps pipelines, which integrate and automate the processes of software development and IT operations, have become critical for rapid and continuous software delivery. However, their extensive automation and integration capabilities make them attractive targets for cyberattacks. One significant threat is the insertion of malicious code through compromised repositories or Continuous Integration/Continuous Deployment (CI/CD) tools. Attackers can exploit vulnerabilities in pipeline tools or use social engineering to gain access, allowing them to insert backdoors or malware into the codebase.

Furthermore, the reliance on third-party tools and libraries within these pipelines can introduce security risks if these dependencies are not adequately vetted or monitored. Once the pipeline is compromised, the malicious code can propagate quickly, leading to widespread and potentially catastrophic impacts on production environments.

Security issues in DevOps pipelines also stem from misconfigurations and insufficient access controls. Often, credentials and sensitive data are inadvertently exposed through improper configuration management or poor secret handling practices, such as hardcoding credentials within scripts. Inadequate segmentation and over-privileged access can also exacerbate the problem, allowing attackers who gain a foothold in one part of the pipeline to move laterally and escalate their privileges. Abuse of the pipeline can result in unauthorized deployment of code, data breaches, and significant disruption to services. To mitigate these risks, organizations need to implement robust security practices, including regular security audits, continuous monitoring, strict access controls, and the use of security tools designed to detect and prevent threats within the DevOps lifecycle.

DevOps resources compromise;
Control of common registry;
Direct PPE (d-PPE);
Indirect PPE (i-PPE);
Public PPE;
Changes in repository;
Inject in Artifacts;
User/Services credentials;
Typosquatting docker registry image;
Resources.

See also:
📌 Compromising CI/CD Pipelines with Leaked Credentials by Security Zines, 2022
📌 Attacking GitLab CI_CD via Shared Runners by Denis Andzakovic, 2023
📌 Compromising the Code: Inside CI/CD Pipeline Attacks, Urshila Ravindran, 2025
📌 Securing CI/CD Pipelines: Common Misconfigurations and Exploits Paths by Charlie Klein, 2025

#SecDevOps
Embold Static Code Analysis Platform

Embold — статический анализатор кода, который необходим в любом процессе DevSecOps. Он позволяет управлять и контролировать качество проектов по разработке ПО.

Embold предоставляется бесплатно для проектов с открытым исходным кодом и доступен как локальное решение или как SaaS; в последнем случае все данные надежно хранятся в облаке, а связь между браузерами и инструментом шифруется с помощью SSL для обеспечения безопасности.

В рамках бесплатного пакета доступны 5 мест для пользователей и 5 сканирований кода объёмом до 50 тысяч строк.

❗️ Официальная страница

#AppSec #SecDevOps