O P E N S O U R C E N E T W O R K M O N I T O R I N G P A U L A D E - - PowerPoint PPT Presentation

o p e n s o u r c e n e t w o r k m o n i t o r i n g
SMART_READER_LITE
LIVE PREVIEW

O P E N S O U R C E N E T W O R K M O N I T O R I N G P A U L A D E - - PowerPoint PPT Presentation

D E E P S E C V I E N A O P E N S O U R C E N E T W O R K M O N I T O R I N G P A U L A D E L A H O Z PAULA DE LA HOZ GARRIDO S E C U R I T Y A U D I T O R C O M P U T E R E N G I N E E R I N G J O U R N A L I S M I N T E R F E R E N C I A S


slide-1
SLIDE 1

O P E N S O U R C E N E T W O R K M O N I T O R I N G

D E E P S E C V I E N A P A U L A D E L A H O Z

slide-2
SLIDE 2

PAULA DE LA HOZ GARRIDO

S E C U R I T Y A U D I T O R C O M P U T E R E N G I N E E R I N G J O U R N A L I S M I N T E R F E R E N C I A S

@ T E R C E R A N E X U S 6

slide-3
SLIDE 3

O U T L I N E

INTRO: WHY OPEN? NETWORK MONITORING DISAGGREGATED HARDWARE NETWORK VIRTUALIZATION COLLABORATIVE HACKING QUESTIONS

slide-4
SLIDE 4

01

W H Y O P E N ?

F R E E D O M O F T H E S O F T W A R E , H A R D W A R E A N D M E A N S

slide-5
SLIDE 5

C O L L A B O R A T I O N C R E A T E B E T T E R P R O J E C T S , A L S O I N S E C U R I T Y . R E S P O N S I B I L I T Y O F T H E C O M M U N I T Y , U N D E R S T A N D I N G O F T H E T E C H . A C C E S S I B L E T E C H N O L O G Y , F O R E V E R Y O N E . O B F U S C A T I O N I S N O T S E C U R I T Y .

slide-6
SLIDE 6

02

N E T W O R K M O N I T O R I N G

C O N T R O L , P R E V E N T I O N A N D A C T I O N S

slide-7
SLIDE 7

TOOLS AND RESOURCES

GETTING THE FILES Wireshark, ettercap, tcpdump + Bro

2018 DEEPSEC VIENA

context (partial/complete) session data transaction data statistics metadata WHAT TO SNIFF? Depending on what we want we perform different monitoring, and techniques HARDWARE? network tap, RPI station, Pineapple, Honeypot...

slide-8
SLIDE 8

03

D I S A G G R E G A T E D H A R D W A R E

N E W H O R I Z O N S , F R E E D O M O F T H E N E T W O R K

slide-9
SLIDE 9

DISAGREGGATED HARDWARE

CHOICE a disaggregated network device allows you to install your choice of operating system.

2018 DEEPSEC VIENA

Edge-Core AS5712 Mellanox SN2700 Alpha Networks SNX-60x0-486F Inventec DCS7032Q28 EXAMPLES AN INCIPIENT REVOLUTION OCP, TIP

slide-10
SLIDE 10

HOW ETHERNET SWITCHES ARE BUILT

there are very few companies worldwide producing merchant Ethernet switch chipset (Silicon). A merchant silicon is a chipset that is already designed, tested and built by a chipset manufacturer, which can be bought by anyone looking to build an Ethernet switch. An Ethernet switch hardware has a simple design and

  • components. In simple terms, a switch consists of the

following components:

Chassis Power supplies Fans To control fans, system management. CPU PCBA Switch main board PCBA

slide-11
SLIDE 11

04

N E T W O R K V I R T U A L I Z A T I O N

C O M M U N I C A T I O N B E T W E E N V I R T U A L M A C H I N E S O R C O N T A I N E R S W I T H I N A C O M P U T E H O S T .

slide-12
SLIDE 12

MAKE IT VIRTUAL!

LINUX Network virtualization includes virtual networks that only exist within a host , as well as technologies that allow communication between Linux bridges of multiple hosts.

2018 DEEPSEC VIENA

Containerization is a method for running multiple isolated Linux systems (containers) on a control host using a single Linux kernel. CONTAINERS MONITORING WITH FALCO monitor behavioral activity and detect anomalous activity in applications.

slide-13
SLIDE 13
slide-14
SLIDE 14
slide-15
SLIDE 15
slide-16
SLIDE 16

THE CONTAINER

attacking/defending

Scanning for vulnerabilities using CoreOS Clair Using seccomp for setting rules Hashicorp for storing "secrets"

slide-17
SLIDE 17

05

C O L L A B O R A T I V E H A C K I N G

H A C K E R S A R E N O T M E A N T T O B E L O N E W O L V E S . . .

slide-18
SLIDE 18

SECURITY OF THE USERS

THIS IS NOT ABOUT YOU, this is about community. The name "hacker" was firstly created for those who learnt, experiment and created together in tech. Now it's all about secure the internet, secure the users. It must keep the community point.

KEEP THE REVOLUTION

Working in community, and cybersec extends to more than using open source. It's a way of standing up against the main problems.

slide-19
SLIDE 19

Questions?

slide-20
SLIDE 20

Thank you!