As we ease back into regular programming, we cover the various activities the
team got up to over the past few weeks whilst away in Riga for the Ubuntu Summit
and Ubuntu Engineering Sprint.
Show Notes
Overview
As we ease back into regular programming, we cover the various activities the
team got up to over the past few weeks whilst away in Riga for the Ubuntu Summit
and Ubuntu Engineering Sprint.
In the last episode we previewed a couple talks by different folks from the
Ubuntu Security Team - recordings for these will be available but currently
there is only the livestreams from the main plenary room - as such, right now
you can go watch Tobias’ talk “From Asahi Linux to Ubuntu: Running Linux on
Apple Silicon”
Back in August, Andrei put out a call for topic suggestions for a
vulnerability discovery workshop that he was putting together, with a
particular focus on open source code bases
He presented this in a 90 minute session 2 weeks ago on the final day of the
Ubuntu Summit
He covered a number of topics with a focus on practical application of each
using dedicated tooling, e.g.:
Threat modelling with OWASP Threat Dragon
Secret scanning with Gitleaks
Dependency scanning with OSV-Scanner
Linting with Bandit and flawfinder
Code querying with Semgrep
Fuzzing with AFL++
Symbolic execution with KLEE
So not only did participants learn about a given technique, such as what
fuzzing is etc, but also how they can easily apply it with standard tooling to
find real world problems
Due to the success of the workshop, he has decided to make the contents
publicly available
Result was very close - won by Anton Troyanov (Senior Engineer on the MAAS team)
Ubuntu Security team members were barred from competing as we had previously
worked on these challenges - BUT shout out to Sudhakar Verma who just joined
our team only 4 weeks ago and so didn’t have any prior experience with this
CTF - managed to solve every single challenge 💪💪💪