Loading…
This event has ended. Create your own event → Check it out
This event has ended. Create your own
View analytic
Wednesday, September 20 • 9:00am - 5:00pm
Open Source Defensive Security (2 of 2 days)

Sign up or log in to save this to your schedule and see who's attending!

Feedback form is now closed.
Open Source Defensive Security Training is an Open Source IT Security laboratory dedicated for professionals who need close the gaps in Linux, Web application & Open Source Security knowledge. Very detailed and up to date course content with focus especially on defensive approach gives you the best opportunity for making stronger defensive layers inside your network infrastructures or/and Linux-based products. Delivering a real world scenarios in our Open Source Defensive Security hands-on labs provide a very practical knowledge you need for expand your Linux Security skills.

This is an extremely deep dive training on Open Source-based infrastructure security, Linux systems and network services hardening. We like details as attackers do and that details bring the differences - from offensive and defensive approach. That's how we see it works. Our high-tech workshop has a unique formula “protection vs attack”. This means that most of the security issues we are talking about will be effectively protected by the use of a suitable approach, sophisticated software and dedicated secure configuration. We focus on delivering a defensive content, but we understand that for being good in defense you have to also be good in offense. That way we are providing a kind of knowledge-mix in those fields using Open Source software. Except basic Linux skills and TCP/IP knowledge, most of the lab exercises required of candidate at least basic understanding of what attacker techniques are. We strongly believe that only a mix of broad, systematic Defensive and Offensive Security knowledge can guarantee secure solutions. As Sun Tzu said: "Know your enemy and know yourself and you can fight a hundred battles without disaster." 

The workshop has prepared the following examples of laboratory scenarios: 
● Web Application Security vs OWASP Top 10 attack techniques and others 
● Grsecurity/PAX/GCC hardening vs Linux kernel and userspace exploitation using vulnerabilities from the last past years (PERF_EVENTS, ptrace/sysret, memppodiper, semtex, sendpage, chroot() escape, dirty_cow, others) 
● Seccomp/capabilities/namespaces vs exploits 
● SELinux vs exploits (Redis Command Execution, Venom, Apache) 
● Volatility vs rootkits 
● Secure SSH relays and importance of low level privileges rule 
● System users accountability, including root 
● Linux Domain Controller 
● Using sysdig/SystemTAP for detecting deviations in the behavior of daemons and services ● Network packet filtering including TOR, ipsets, IP reputation, port knocking 
● Network honeypots vs scanning tools and obstruction of the process of enumeration 
● PCAP analysis and Deep Packet Inspection vs malware 
● Sandboxing for malware detection and deep analysis (cuckoo, yara) and others 

Target: 
● Linux administrators & System Architects 
● IT Security professionals 
● Penetration testers 
● IT Security consultants and Open Source specialists 

Thanks to this training you will: 
● learn techniques to protect your Linux systems against attacks used by modern attackers 
● find out how you can protect Linux servers and web applications against real attacks 
● learn how to use dozens of solutions and security tools for offensive and defensive scope 
● configure several advanced solutions to reduce the success of the attack or minimize the risk of the use of vulnerability 

True values: 
● real life, 100% pure lab-oriented defensive security scenarios 
● minimum theory, maximum hands-on 
● a lot of cumulated knowledge in one place 
● created by enthusiasts and professionals for professionals with enthusiasm 

Agenda: 

1. Threats are everywhere - introduction to technical Open Source Defensive Security program. 

2. Web application security -> hardened Reverse Proxy -> modsecurity vs HTTP security issues: 
● Analysis and practical use of exploits for popular web applications: Jenkins, Zimbra, PHPnuke, Joomla, Drupal, PHPmyadmin, OScommerce, Magento, Wordpress, dotProject and others 
● Authorization and authentication: CAS SSO, OAuth, SAML (ipsilon), Federation, Basic / Digest Auth, SSL authentication, LDAP authorization, SAML based - mod_auth_mellon, Kerberos based - mod_auth_kerb, Login-form based - mod_intercept_form_submit, Mod_lookup_identity, mod_pubcookie 
●HTTPS – how to achieve status A+?: 
○ Attacks: 
■ Heartbleed
■ Breach 
■ Drown 
■ Beast 
■ Poodle 
■ MiTM: sslstrip 
○ Mutual SSL 
● Security headers: Content Security Policy, Cross Origin Resource Sharing / Same Origin Policy, X-Frame-Options, X-Content-Type-Options, X-XSS-Protection, Fetch API, Service Workers, Sub_resource Integrity, Per-page sub-origins, Content Security Policy (CSP), HTTP Strict Transport Security (HSTS), Same Origin Policy (SOP) / Cross Origin Resource Sharing (CORS), HPKP, PFS 
● Cookies: Secure, Httponly, Domain, Path, Same_site, Clear Site Data Feature Policy, First-party cookies 
● HTTP header anomalies Virtual patching 
● Full HTTP auditing 
● LUA/OpenResty support 
● Sensor approach - OWASP Appsensor 
● Web application security using Modsecurity - creating dedicated WAF rules against: 
■ *Injections 
■ Null bytes 
■ Path/directory traversal 
■ LFI/RFI->Command Execution 
■ Cross Site Scripting (XSS)
■ Cross Site Request Forgery (CSRF) 
■ HTTP Parameter Pollution (HPP)
■ Open Redirect 
■ Insecure Direct Object Reference vs HMAC 
■ Forceful Browsing 
■ CSWSH - Cross Site Websocket Hijacking 
■ Session Security 
■ Brute force
■ Slow DOS 
■ GEO restrictions 
■ Error handling 
■ Leakage detection 
■ Secure file upload
■ Secure logout / forgot password form
■ Web honeypots 
■ Bot/scan protection 
■ AV protection 
■ PHP Security 
■ Tomcat Security 
■ Tools: 
● Sqlmap, sqlninja 
● Xsser 
● Dominator 
● Skipfish 
● ZAP / Burp 
● Wafdetect 
● Joomscan, wpscan 
● Dirbuster, dirb 
● Nikto 
● JSDetox 
● Brakeman 
● And others 

3. Hardened Linux vs exploits/rootkits: 
● Discretionary Access Control (DAC) vs Mandatory Access Control (MAC) 
● Grsecurity / PAX 
● SELinux / Multi Category Security / sVirt 
● Apparmor, Tomoyo, Smack, RSBAC 
● GCC hardening: SSP, NX, PIE, RELRO, ASLR vs attacks 
● Linux Containers - Docker/LXC 
● LKM-off / YAMA / enforcing 
● Linux capabilities vs SUID and others 
● System call restriction - seccomp 
● Integrity checking - IMA/EVM 
● Package mgmt security 
● Debuggers and profilers - gdb/strace/ldd/Valgring/Yara 
● Chroot/jail/pivot_root 
● Behavioral analysis - systemtap / LTTng / sysdig 
● Memory forensics - Volatility vs malware 
● PAM / 2FA 
● System update vs reboot 
● *privchecks 

4. Network security: 
● Vulnerability scanning: 
● Nmap NSE 
● Seccubus 
● OpenVAS 
● Metasploit 
● Linux Domain Controller - IdM/HBAC/SUDO 
● SFTP/SCP - Secure SSH Relay 
● Restricted shells/commands 
● SSH tips and tricks 
● Public Key Infrastructure – SSL/TLS 
● NFS Security 
● Database Security
● DNS Security 
● Mail Security 
● DOS / scanning / brute-force protection techniques 
● Advanced network firewall: iptables/nftables/ebtables 
● System honeypots 
● Network traffic analysis - wireshark, scapy / tcpdump / tcpreplay 
● Suricata / Bro IDS / Snort / SELKS vs known malware and attacks: 
     ○ Metasploit, 
     ○ PtH, 
     ○ Heartbleed, 
     ○ shellshock and others 
● Security by obscurity 

5. System Auditing, integrating & accounting: 
● *syslog 
● Auditd 
● OSSEC / Samhain / aide 
● SIEM: Splunk/ELK/OSSIM/osquery 

6. Summary: offense vs defense

Speakers
avatar for Leszek Mis

Leszek Mis

VP of Cyber Security / IT Security Architect, Collective Sense / Defensive Security
Leszek Miś has over 12 years of experience in IT security technology supporting the largest companies and institutions for implementation, consulting and technical training. Next to that, he has 8 years of experience in teaching and transferring a technical knowledge and experie... Read More →


Wednesday September 20, 2017 9:00am - 5:00pm
Fiesta 8

Attendees (3)