Hassle Free Security Automation with Free and Open Source tools - - PowerPoint PPT Presentation

hassle free security automation with free and open source
SMART_READER_LITE
LIVE PREVIEW

Hassle Free Security Automation with Free and Open Source tools - - PowerPoint PPT Presentation

Hassle Free Security Automation with Free and Open Source tools Anderson Dadario https://dadario.com.br - - - - - - - - - - - - - - Source: https://blog.ripstech.com/2016/the-state-of-wordpress-security/ [1] Source:


slide-1
SLIDE 1

Hassle Free Security Automation with Free and Open Source tools

Anderson Dadario https://dadario.com.br

slide-2
SLIDE 2
slide-3
SLIDE 3
slide-4
SLIDE 4
slide-5
SLIDE 5
slide-6
SLIDE 6
slide-7
SLIDE 7
slide-8
SLIDE 8
slide-9
SLIDE 9
slide-10
SLIDE 10
slide-11
SLIDE 11
slide-12
SLIDE 12
slide-13
SLIDE 13
slide-14
SLIDE 14

Source: https://blog.ripstech.com/2016/the-state-of-wordpress-security/

slide-15
SLIDE 15

[1] Source: https://en.wikipedia.org/wiki/SQL_injection

slide-16
SLIDE 16
slide-17
SLIDE 17
slide-18
SLIDE 18
slide-19
SLIDE 19
slide-20
SLIDE 20

Source: https://www.iamthecavalry.org/

slide-21
SLIDE 21

Who are these guys? Aaron Weaver and Matt Tesauro, respectively. They work on a few OWASP projects, including OWASP AppSec Pipeline and OWASP Defect Dojo. They work on those projects because they are the calvary themselves. Not only them, but these picture came very handy.

slide-22
SLIDE 22
slide-23
SLIDE 23
slide-24
SLIDE 24

slide-25
SLIDE 25
slide-26
SLIDE 26
slide-27
SLIDE 27
slide-28
SLIDE 28
slide-29
SLIDE 29

Source: https://en.wikipedia.org/wiki/Loss_aversion

slide-30
SLIDE 30

Source: https://www.schneier.com/essays/archives/2008/07/how_the_human_brain.html

slide-31
SLIDE 31
slide-32
SLIDE 32
slide-33
SLIDE 33
slide-34
SLIDE 34
slide-35
SLIDE 35

Source: https://fitzvillafuerte.com/the-principle-of-leverage-and-how-to-use-it-in-our-life.html

slide-36
SLIDE 36
slide-37
SLIDE 37
slide-38
SLIDE 38
slide-39
SLIDE 39
slide-40
SLIDE 40
slide-41
SLIDE 41
slide-42
SLIDE 42
slide-43
SLIDE 43
slide-44
SLIDE 44
slide-45
SLIDE 45

CostaScanner

1) Periodically scan the entire network segment (e.g., 192.168.0.0/24) and look for servers that are up. If a server is up for the first time, CostaScanner trigger actions such as 1) Notify all newly detected servers by email 2) Scan each new server using tools defined by you. CostaScanner stores asset data in the “database.txt” file 2) Configurable actions can be chosen to be executed after a new server is detected. They can be configured right from the configuration file, without needing to code. In the configuration file there is an example of how to add a new scanner (e.g., StartPing) 3) Scans’ reports can be sent to your inbox, to a URL (CostaScanner issues a POST HTTP Request) or just be saved to a file.

slide-46
SLIDE 46
slide-47
SLIDE 47
slide-48
SLIDE 48
slide-49
SLIDE 49

# Targets # Note: [1] targets must be separated by "," without spaces # [2] if you have an individual IP address, just fill it # by appending "/32" as the following: "192.168.1.10/32" TARGETS=192.168.0.0/24

slide-50
SLIDE 50

# Operations after a server has been discovered # Custom Operations can be set in this configuration file # Let's suppose that we want to run the "ping" scanner # First of all, it must be installed (check Dockerfile) # After that, you can set a new operation just like below # # [ # { # "name":"StartPing", # "operation":"StartScanner", # "data": # { # "scanner":"ping", # "params":["-c","1","%server%"] # } # } # ] # # It will execute: $ ping -c 1 <server> # # After that, make sure to set it as an operation to be executed # CUSTOM_OPERATIONS=[{"name":"StartPing","operation":"StartScanner","data":{"scanner":"ping","params":["-c","1","%server%"]}}]

slide-51
SLIDE 51

# Default Available: Print, SendEmail, StartNmap, SendWebhook, RegisterOnGauntlet # Note: operations must be separated by "," without spaces OPERATIONS=Print,SendEmail,StartNmap,StartPing # Redis # In case you want to use an external Redis # Change the URL below REDIS_URL=redis://localhost:6379/infosec # WEBHOOK # URL to send a POST # Containing all newly discovered servers WEBHOOK_URL=https://mydomain.com/some-uri

slide-52
SLIDE 52

# SCANNER SCANNER_SEND_EMAIL=True SCANNER_SEND_WEBHOOK=False SCANNER_SAVE_TO_FILE=True # SMTP # Auth types: none, plain, login, cram_md5 # Note: SMTP_TO can be multiple emails # but they need to be separated by "," # without spaces SMTP_TO=me@gmail.com SMTP_FROM=noreply@mydomain.com SMTP_SUBJECT=New servers were found! SMTP_HOST=smtphost.com SMTP_PORT=587 SMTP_ENABLE_STARTTLS_AUTO=True SMTP_USER=aaa SMTP_PASS=bbb SMTP_DOMAIN=mydomain.com SMTP_AUTH=plain

slide-53
SLIDE 53
slide-54
SLIDE 54
slide-55
SLIDE 55
slide-56
SLIDE 56
slide-57
SLIDE 57

Dockerfile Docker Image Docker Containers I’ve made a free docker security course [in pt-br and en-us]: https://dadario.com.br/courses/

slide-58
SLIDE 58

Dockerfile Docker Image Docker Containers Dockerfile

FROM ubuntu:14.04 RUN apt-get update && apt-get install -y redis-server EXPOSE 6379 ENTRYPOINT ["/usr/bin/redis-server"]

Build Image

$ docker build -t AndersonDadario/redis .

Run Container

$ docker run --name redis -d AndersonDadario/redis

I’ve made a free docker security course [in pt-br and en-us]: https://dadario.com.br/courses/

slide-59
SLIDE 59
slide-60
SLIDE 60
slide-61
SLIDE 61
slide-62
SLIDE 62
slide-63
SLIDE 63
slide-64
SLIDE 64
slide-65
SLIDE 65
slide-66
SLIDE 66
slide-67
SLIDE 67
slide-68
SLIDE 68
slide-69
SLIDE 69
slide-70
SLIDE 70
slide-71
SLIDE 71

Anderson Dadario @andersonmvd https://dadario.com.br