c0c0n is a 19 years old platform that is aimed at providing opportunities to showcase, educate, understand and spread awareness on Information Security, data protection, and privacy...
GitHub is where code, identity, automation, and release trust meet. If your org ships software, your GitHub org is part of your production environment.
This training shows how attackers abuse GitHub Actions, runners, tokens, and integrations to compromise builds and releases, then switches to defense with a practical hardening playbook and an organization level security review.
Format: hands-on, scenario-driven, guided labs, plus a capstone.
Lab: Build a mental map of a target GitHub org and identify high value workflow entry points
Lab: Create a CI/CD threat model for a GitHub Actions workflow and assign concrete abuse paths.
Lab: Identify a viable initial access path into a vulnerable org using only GitHub visible signals.
Lab: Exploit a vulnerable workflow to gain unauthorized access to secrets and build outputs.
Lab: Demonstrate a PR-driven abuse path, then refactor the workflow to remove the class of bug.
Lab: Compromise a self-hosted runner and show lateral movement. Apply hardening and validate the fix.
Lab: Execute a release compromise scenario and then implement a hardened release workflow.
Lab: Convert a risky workflow into a hardened baseline with minimal functionality loss.
Lab: Replace long-lived deployment secrets with safer deployment patterns.
A guided review of a GitHub org with a repeatable checklist and a prioritized hardening plan
Topics covered: