Hiding Secrets & Finding Secrets - How to get hacked with your own credentials
Handling credentials, API keys and database or cloud service passwords is a constant challenge. There are so many hacked platforms via credentials hardcoded in source, pushed to a repository or even deployed to production as a file.
We are going to take a journey in how easy it is to mess up - with real examples, and what good practices we can apply to avoid being hacked with our own passwords.