SlideShare una empresa de Scribd logo
1 de 41
Descargar para leer sin conexión
Open Source
Cyber Weaponry
introduction




Chief Security   Founder & Chief
   Officer          Architect
background

Perspective
• 15 years of software development
• 12 years of penetration testing
• Involved in OSS since 1995
• Ex-USAF contractor
1999

Military contracting circa 1999
• Ultra-secretive and ultra-competitive
• Teams furiously reinventing wheels
• Open source was still “sketchy”
• Little code sharing
1999

Security tools circa 1999
 • Vulnerability scanning was still edgy
 • Penetration testing 100% manual
 • Offensive tools in their infancy
 • No comprehensive exploit toolkits
 • Teams hoarded modified public code
1999

“Cyber Weapons” circa 1999
• Shatter-your-drive-remotely stuff
• Scary words and half-truths
• Focused on DE, EMPs, etc
boom
today

Military contracting today
• Still ultra-secretive and ultra-competitive
• Still reinventing well-defined wheels
• Offense is becoming acceptable
• More use of open-source code
• Better informed customers
today

Security tools today
 • Vulnerability scanning is well understood
 • Penetration test automation is growing
 • Tons of commercial and OSS tools
 • Exploit code has been productized
 • Wide array of niche tools
today

“Cyber Weapons” today
• Term usually reserved for offensive tools
• Tons of contractors working on these
• Similar requirements to commercial
• No longer far from reality
cyber weapons

Offensive cyber tools
 • Common goals
   • Permissions and accountability
   • Usable by lightly-trained staff
   • Great attack visualization
   • Multiple tool integration
   • Modular design

 • Non-commercial projects exist (NETT)

 • Integration with defense is important
cyber weapons

Offensive components
 • Reconnaissance
 • Attack Vectors
 • Payloads
 • Control
 • Data
cyber weapons

The “cyber” sniff test
 • How portable is the target-facing software?
 • How do they add new exploit vectors?
 • How much is written in Java?
 • How big is their exploit team?
 • How big is their payload team?
 • How do they handle stealth?
 • Who are their security experts?
 • Does it work on real networks?
 • What targets are supported?
 • What OSS does it use?
cyber weapons

The Open Source requirement
 • Costs scale poorly with commercial deps
 • OSS security tools adapt faster
 • OSS provides transparency
 • OSS tools set a minimum bar
cyber weapons

Open Source components
 • Nmap for host & service detection
 • Snort or Suricata for traffic analysis
 • Metasploit for exploits and payloads
 • DRADIS for notes and reporting

 • Linux, PostgreSQL, Apache
 • Ruby, Perl, Python, PHP
metasploit

The Metasploit Framework
 • Created in the summer of 2003
 • An exploit development platform
 • Licensed under New BSD

 • Popular and gigantic
  • Over 450,000 lines of code
  • Over 100,000 users/mo
  • ~600 exploit modules
  • ~200 payloads
metasploit architecture
                      LIBRARIES          INTERFACES

  TOOLS                 Rex                Console

                                             CLI
                      MSF Core
                                            RPC


 PLUGINS              MSF Base              GUI



                      MODULES

Payloads   Exploits   Encoders    Nops        Aux
metasploit

Lego, for network attacks
 • Choose a specific exploit module
 • Choose a compatible payload
 • Configure options
 • Launch!
metasploit

                    888                           888        Y8P888
                    888                           888           888
88888b.d88b. .d88b. 888888 8888b. .d8888b 88888b. 888 .d88b. 888888888
888 "888 "88bd8P Y8b888       "88b88K     888 "88b888d88""88b888888
888 888 88888888888888    .d888888"Y8888b.888 888888888 888888888
888 888 888Y8b.     Y88b. 888 888      X88888 d88P888Y88..88P888Y88b.
888 888 888 "Y8888 "Y888"Y888888 88888P'88888P" 888 "Y88P" 888 "Y888
                                          888
                                          888
                                          888


       =[   metasploit v3.4.2-dev [core:3.4 api:1.0]
+ -- --=[   578 exploits - 296 auxiliary
+ -- --=[   212 payloads - 27 encoders - 8 nops
       =[   svn r9949 updated today (2010.08.03)

msf >
metasploit

Advantages of a modular design
 • Extend framework with proprietary modules
 • Use your payloads with our exploits
 • Use our payloads with your exploits
 • Split work by classification level
metasploit

Automation with Metasploit
 • Create resource scripts with embedded Ruby
 • Create console plugins to add commands
 • Create new modules to drive a process
 • Call Ruby directly from the console prompt
 • Talk to the builtin XMLRPC daemon
metasploit

Platform requirements
 • Any recent Windows, BSD, or Linux
 • Ruby 1.8.7+ (including 1.9.x)
 • OpenSSL
metasploit

Exploit coverage
 • Linux (x86, ARM, MIPS, PowerPC)
 • Windows (x86, x64)
 • OS X (ARM, PowerPC, x86)
 • Solaris (x86, SPARC)
 • AIX (PowerPC)
 • IRIX (MIPS)
 • Java
 • PHP
metasploit

Payload features
 • The Meterpreter (Win32, PHP, Java)
  • Encrypted control channels
  • Extensible at runtime
  • Full OS control
  • Scriptable

 • Staged and unstaged command shells
 • Ruby-based C / ASM compiler
 • Post-exploitation scripting
metasploit

Additional modules
 • Over 200 modules for information gathering
 • Scan large networks for data leaks
 • Exploit logic bugs for access
 • Capture data from clients
 • Find new flaws
metasploit

Database support
 • Automatically store all gathered data
 • Track all events (commands, sessions)
 • Easily build reports from this data
metasploit capabilities

Stealth and evasion
 • Exploits and payloads are randomized

 • Exploits use custom protocol stacks
  • Low-level SMB, HTTP, RPC control
  • Timing and fragment evasion


 • Payloads never write to the disk
 • Limited forensic footprint
 • Simple to control
metasploit capabilities

Full support for IPv6
 • Complete socket support and payloads
 • Great for compromising link-local Ips
 • Works great with real IPv6 links
metasploit capabilities

Infinitely customizable
 • Ruby lends to a flexible object model
 • Modify any code via loadable plugins
 • Override specific libraries
metasploit capabilities

Instant remote desktop hijack
 • Use the “vncinject” payload with any exploit
 • Instantly gain desktop access to the target
 • Even on logged-off systems
metasploit capabilities
metasploit capabilities

Relay attacks through targets
 • Use the “meterpreter” payload type
 • Launch the exploit, gain a session
 • Set a route for the target’s network
 • Launch exploits from the first target
   • Working with Windows, PHP, Java
metasploit capabilities

Dump and pass Windows hashes
 • Dump the hashes from a Win32 target
 • Use any hash as the SMB password
 • Provides “psexec” to other targets
   • Uses our custom SMB protocol stack
metasploit capabilities

Search for and acquire evidence
 • Meterpreter scripts for find & download
 • Gather passwords and sensitive docs
 • Works for all Meterpreter platforms
metasploit capabilities

Interact with targeted users
 • Determine whether the user is idle
 • Install a hotkey hook inside of Winlogon
 • Force lock the user’s desktop
 • Read the captured password
metasploit express

Metasploit Express
 • Commercial product from Rapid7
 • Not a fork, but a direct extension
 • Built by the same core team
 • Pays for OSS development
 • Uses the open APIs
metasploit examples

Mined the public NTP servers
 • Discovered over 21m NTP client systems
 • Resulted in a great map of infrastructure
 • Identified a potential 20Gbps DDoS risk
 • A single Metasploit module + console
metasploit examples

Scanned 3.1 billion IPs
 • Identifying vulnerable VxWorks devices
 • Resulted in a 100+ vendor CERT advisory
 • Also, a single Metasploit module
 • Took 3 days and $19
summary

Cyber is what you make of it
 • Most of the parts exist in OSS
 • Metasploit is easy to build on
 • Free to use, free to extend
questions




Questions?
 hdm@metasploit.com

Más contenido relacionado

La actualidad más candente

Netflix Open Source Meetup Season 4 Episode 2
Netflix Open Source Meetup Season 4 Episode 2Netflix Open Source Meetup Season 4 Episode 2
Netflix Open Source Meetup Season 4 Episode 2aspyker
 
Introduction to Dynamic Malware Analysis ...Or am I "Cuckoo for Malware?"
Introduction to Dynamic Malware Analysis   ...Or am I "Cuckoo for Malware?"Introduction to Dynamic Malware Analysis   ...Or am I "Cuckoo for Malware?"
Introduction to Dynamic Malware Analysis ...Or am I "Cuckoo for Malware?"Lane Huff
 
CheckPlease - Payload-Agnostic Implant Security
CheckPlease - Payload-Agnostic Implant SecurityCheckPlease - Payload-Agnostic Implant Security
CheckPlease - Payload-Agnostic Implant SecurityBrandon Arvanaghi
 
Shmoocon Epilogue 2013 - Ruining security models with SSH
Shmoocon Epilogue 2013 - Ruining security models with SSHShmoocon Epilogue 2013 - Ruining security models with SSH
Shmoocon Epilogue 2013 - Ruining security models with SSHAndrew Morris
 
Docker Security
Docker SecurityDocker Security
Docker Securityantitree
 
Netflix oss season 2 episode 1 - meetup Lightning talks
Netflix oss   season 2 episode 1 - meetup Lightning talksNetflix oss   season 2 episode 1 - meetup Lightning talks
Netflix oss season 2 episode 1 - meetup Lightning talksRuslan Meshenberg
 
Integrating web archiving in preservation workflows. Louise Fauduet, Clément ...
Integrating web archiving in preservation workflows. Louise Fauduet, Clément ...Integrating web archiving in preservation workflows. Louise Fauduet, Clément ...
Integrating web archiving in preservation workflows. Louise Fauduet, Clément ...Biblioteca Nacional de España
 
Practical White Hat Hacker Training - Active Information Gathering
Practical White Hat Hacker Training - Active Information GatheringPractical White Hat Hacker Training - Active Information Gathering
Practical White Hat Hacker Training - Active Information GatheringPRISMA CSI
 
Netflix Open Source Meetup Season 3 Episode 2
Netflix Open Source Meetup Season 3 Episode 2Netflix Open Source Meetup Season 3 Episode 2
Netflix Open Source Meetup Season 3 Episode 2aspyker
 
Outlook and Exchange for the bad guys
Outlook and Exchange for the bad guysOutlook and Exchange for the bad guys
Outlook and Exchange for the bad guysNick Landers
 
ContainerDays Boston 2016: "Hiding in Plain Sight: Managing Secrets in a Cont...
ContainerDays Boston 2016: "Hiding in Plain Sight: Managing Secrets in a Cont...ContainerDays Boston 2016: "Hiding in Plain Sight: Managing Secrets in a Cont...
ContainerDays Boston 2016: "Hiding in Plain Sight: Managing Secrets in a Cont...DynamicInfraDays
 
Netflix oss season 1 episode 3
Netflix oss season 1 episode 3 Netflix oss season 1 episode 3
Netflix oss season 1 episode 3 Ruslan Meshenberg
 
OFFENSIVE: Exploiting DNS servers changes BlackHat Asia 2014
OFFENSIVE: Exploiting DNS servers changes BlackHat Asia 2014OFFENSIVE: Exploiting DNS servers changes BlackHat Asia 2014
OFFENSIVE: Exploiting DNS servers changes BlackHat Asia 2014Leonardo Nve Egea
 
OSMC 2008 | Monitoring Tools Shootout by Tom De Cooman
OSMC 2008 | Monitoring Tools Shootout by Tom De CoomanOSMC 2008 | Monitoring Tools Shootout by Tom De Cooman
OSMC 2008 | Monitoring Tools Shootout by Tom De CoomanNETWAYS
 
Ultimate pen test compromising a highly secure environment (nikhil)
Ultimate pen test   compromising a highly secure environment (nikhil)Ultimate pen test   compromising a highly secure environment (nikhil)
Ultimate pen test compromising a highly secure environment (nikhil)ClubHack
 
Introduction to Openstack Network
Introduction to Openstack NetworkIntroduction to Openstack Network
Introduction to Openstack Networksalv_orlando
 
Bsides Puerto Rico 2017-2018
Bsides Puerto Rico 2017-2018Bsides Puerto Rico 2017-2018
Bsides Puerto Rico 2017-2018Esteban Rodriguez
 
Quantum - Virtual networks for Openstack
Quantum - Virtual networks for OpenstackQuantum - Virtual networks for Openstack
Quantum - Virtual networks for Openstacksalv_orlando
 

La actualidad más candente (20)

Netflix Open Source Meetup Season 4 Episode 2
Netflix Open Source Meetup Season 4 Episode 2Netflix Open Source Meetup Season 4 Episode 2
Netflix Open Source Meetup Season 4 Episode 2
 
Kali presentation
Kali presentationKali presentation
Kali presentation
 
Introduction to Dynamic Malware Analysis ...Or am I "Cuckoo for Malware?"
Introduction to Dynamic Malware Analysis   ...Or am I "Cuckoo for Malware?"Introduction to Dynamic Malware Analysis   ...Or am I "Cuckoo for Malware?"
Introduction to Dynamic Malware Analysis ...Or am I "Cuckoo for Malware?"
 
CheckPlease - Payload-Agnostic Implant Security
CheckPlease - Payload-Agnostic Implant SecurityCheckPlease - Payload-Agnostic Implant Security
CheckPlease - Payload-Agnostic Implant Security
 
Shmoocon Epilogue 2013 - Ruining security models with SSH
Shmoocon Epilogue 2013 - Ruining security models with SSHShmoocon Epilogue 2013 - Ruining security models with SSH
Shmoocon Epilogue 2013 - Ruining security models with SSH
 
Docker Security
Docker SecurityDocker Security
Docker Security
 
Netflix oss season 2 episode 1 - meetup Lightning talks
Netflix oss   season 2 episode 1 - meetup Lightning talksNetflix oss   season 2 episode 1 - meetup Lightning talks
Netflix oss season 2 episode 1 - meetup Lightning talks
 
Integrating web archiving in preservation workflows. Louise Fauduet, Clément ...
Integrating web archiving in preservation workflows. Louise Fauduet, Clément ...Integrating web archiving in preservation workflows. Louise Fauduet, Clément ...
Integrating web archiving in preservation workflows. Louise Fauduet, Clément ...
 
Practical White Hat Hacker Training - Active Information Gathering
Practical White Hat Hacker Training - Active Information GatheringPractical White Hat Hacker Training - Active Information Gathering
Practical White Hat Hacker Training - Active Information Gathering
 
Netflix Open Source Meetup Season 3 Episode 2
Netflix Open Source Meetup Season 3 Episode 2Netflix Open Source Meetup Season 3 Episode 2
Netflix Open Source Meetup Season 3 Episode 2
 
Tools kali
Tools kaliTools kali
Tools kali
 
Outlook and Exchange for the bad guys
Outlook and Exchange for the bad guysOutlook and Exchange for the bad guys
Outlook and Exchange for the bad guys
 
ContainerDays Boston 2016: "Hiding in Plain Sight: Managing Secrets in a Cont...
ContainerDays Boston 2016: "Hiding in Plain Sight: Managing Secrets in a Cont...ContainerDays Boston 2016: "Hiding in Plain Sight: Managing Secrets in a Cont...
ContainerDays Boston 2016: "Hiding in Plain Sight: Managing Secrets in a Cont...
 
Netflix oss season 1 episode 3
Netflix oss season 1 episode 3 Netflix oss season 1 episode 3
Netflix oss season 1 episode 3
 
OFFENSIVE: Exploiting DNS servers changes BlackHat Asia 2014
OFFENSIVE: Exploiting DNS servers changes BlackHat Asia 2014OFFENSIVE: Exploiting DNS servers changes BlackHat Asia 2014
OFFENSIVE: Exploiting DNS servers changes BlackHat Asia 2014
 
OSMC 2008 | Monitoring Tools Shootout by Tom De Cooman
OSMC 2008 | Monitoring Tools Shootout by Tom De CoomanOSMC 2008 | Monitoring Tools Shootout by Tom De Cooman
OSMC 2008 | Monitoring Tools Shootout by Tom De Cooman
 
Ultimate pen test compromising a highly secure environment (nikhil)
Ultimate pen test   compromising a highly secure environment (nikhil)Ultimate pen test   compromising a highly secure environment (nikhil)
Ultimate pen test compromising a highly secure environment (nikhil)
 
Introduction to Openstack Network
Introduction to Openstack NetworkIntroduction to Openstack Network
Introduction to Openstack Network
 
Bsides Puerto Rico 2017-2018
Bsides Puerto Rico 2017-2018Bsides Puerto Rico 2017-2018
Bsides Puerto Rico 2017-2018
 
Quantum - Virtual networks for Openstack
Quantum - Virtual networks for OpenstackQuantum - Virtual networks for Openstack
Quantum - Virtual networks for Openstack
 

Destacado

PRINCE2 and Agile Project Management - ProjectingIT APMG ATO
PRINCE2 and Agile Project Management - ProjectingIT APMG ATOPRINCE2 and Agile Project Management - ProjectingIT APMG ATO
PRINCE2 and Agile Project Management - ProjectingIT APMG ATOprojectingIT
 
Scrum under PRINCE 2
Scrum under PRINCE 2Scrum under PRINCE 2
Scrum under PRINCE 2Vishal Sharma
 
Mix Agile with Prince 2 for rewarding results
Mix Agile with Prince 2 for rewarding resultsMix Agile with Prince 2 for rewarding results
Mix Agile with Prince 2 for rewarding resultsEdward Gould
 
Nordic project zone talk on Agile and PRINCE2
Nordic project zone talk on Agile and PRINCE2Nordic project zone talk on Agile and PRINCE2
Nordic project zone talk on Agile and PRINCE2Martin Ellemann Olesen
 
Webinar on PRINCE2 + Agile - by Ashish Dhoke (projectingIT)
Webinar on PRINCE2 + Agile - by Ashish Dhoke (projectingIT)Webinar on PRINCE2 + Agile - by Ashish Dhoke (projectingIT)
Webinar on PRINCE2 + Agile - by Ashish Dhoke (projectingIT)projectingIT
 
A real life case study of using Agile and PRINCE2 together - AgilePM
A real life case study of using Agile and PRINCE2 together - AgilePMA real life case study of using Agile and PRINCE2 together - AgilePM
A real life case study of using Agile and PRINCE2 together - AgilePMTraining Bytesize
 
PRINCE2 Agile Guidance Preview
PRINCE2 Agile Guidance PreviewPRINCE2 Agile Guidance Preview
PRINCE2 Agile Guidance PreviewFrank Turley
 
PRINCE2 + AGILE = SUCCESS
PRINCE2 + AGILE = SUCCESSPRINCE2 + AGILE = SUCCESS
PRINCE2 + AGILE = SUCCESSJens Hoffmann
 
PRINCE2 Process Model
PRINCE2 Process ModelPRINCE2 Process Model
PRINCE2 Process ModelprojectingIT
 
Business Continuity Management (BCM, BCP) Smaple (Animations don't work in Sl...
Business Continuity Management (BCM, BCP) Smaple (Animations don't work in Sl...Business Continuity Management (BCM, BCP) Smaple (Animations don't work in Sl...
Business Continuity Management (BCM, BCP) Smaple (Animations don't work in Sl...Alexander Larsen
 
Prince2 Agile Frukostmöte
Prince2 Agile FrukostmötePrince2 Agile Frukostmöte
Prince2 Agile FrukostmöteLars Lundgren
 
13.3 - The Age of Chivalry and Medieval Weaponry
13.3 - The Age of Chivalry and Medieval Weaponry13.3 - The Age of Chivalry and Medieval Weaponry
13.3 - The Age of Chivalry and Medieval WeaponryDan Ewert
 
Discover how agile can enhance your organization’s project delivery
Discover how agile can enhance your organization’s project deliveryDiscover how agile can enhance your organization’s project delivery
Discover how agile can enhance your organization’s project deliveryAXELOS Global Best Practice
 

Destacado (16)

Your weaponry; activation #5
Your weaponry; activation #5Your weaponry; activation #5
Your weaponry; activation #5
 
PRINCE2 and Agile Project Management - ProjectingIT APMG ATO
PRINCE2 and Agile Project Management - ProjectingIT APMG ATOPRINCE2 and Agile Project Management - ProjectingIT APMG ATO
PRINCE2 and Agile Project Management - ProjectingIT APMG ATO
 
Scrum under PRINCE 2
Scrum under PRINCE 2Scrum under PRINCE 2
Scrum under PRINCE 2
 
Mix Agile with Prince 2 for rewarding results
Mix Agile with Prince 2 for rewarding resultsMix Agile with Prince 2 for rewarding results
Mix Agile with Prince 2 for rewarding results
 
Nordic project zone talk on Agile and PRINCE2
Nordic project zone talk on Agile and PRINCE2Nordic project zone talk on Agile and PRINCE2
Nordic project zone talk on Agile and PRINCE2
 
Webinar on PRINCE2 + Agile - by Ashish Dhoke (projectingIT)
Webinar on PRINCE2 + Agile - by Ashish Dhoke (projectingIT)Webinar on PRINCE2 + Agile - by Ashish Dhoke (projectingIT)
Webinar on PRINCE2 + Agile - by Ashish Dhoke (projectingIT)
 
A real life case study of using Agile and PRINCE2 together - AgilePM
A real life case study of using Agile and PRINCE2 together - AgilePMA real life case study of using Agile and PRINCE2 together - AgilePM
A real life case study of using Agile and PRINCE2 together - AgilePM
 
PRINCE2 Agile Guidance Preview
PRINCE2 Agile Guidance PreviewPRINCE2 Agile Guidance Preview
PRINCE2 Agile Guidance Preview
 
PRINCE2 + AGILE = SUCCESS
PRINCE2 + AGILE = SUCCESSPRINCE2 + AGILE = SUCCESS
PRINCE2 + AGILE = SUCCESS
 
PRINCE2 Process Model
PRINCE2 Process ModelPRINCE2 Process Model
PRINCE2 Process Model
 
AXELOS - PRINCE2 Agile® Practitioner
AXELOS - PRINCE2 Agile® PractitionerAXELOS - PRINCE2 Agile® Practitioner
AXELOS - PRINCE2 Agile® Practitioner
 
Business Continuity Management (BCM, BCP) Smaple (Animations don't work in Sl...
Business Continuity Management (BCM, BCP) Smaple (Animations don't work in Sl...Business Continuity Management (BCM, BCP) Smaple (Animations don't work in Sl...
Business Continuity Management (BCM, BCP) Smaple (Animations don't work in Sl...
 
Prince2 Agile Frukostmöte
Prince2 Agile FrukostmötePrince2 Agile Frukostmöte
Prince2 Agile Frukostmöte
 
13.3 - The Age of Chivalry and Medieval Weaponry
13.3 - The Age of Chivalry and Medieval Weaponry13.3 - The Age of Chivalry and Medieval Weaponry
13.3 - The Age of Chivalry and Medieval Weaponry
 
Discover how agile can enhance your organization’s project delivery
Discover how agile can enhance your organization’s project deliveryDiscover how agile can enhance your organization’s project delivery
Discover how agile can enhance your organization’s project delivery
 
Prince2 Methodology
Prince2 MethodologyPrince2 Methodology
Prince2 Methodology
 

Similar a Open Source Cyber Weaponry

Metasploitation part-1 (murtuja)
Metasploitation part-1 (murtuja)Metasploitation part-1 (murtuja)
Metasploitation part-1 (murtuja)ClubHack
 
DefCamp 2013 - MSF Into The Worm Hole
DefCamp 2013 - MSF Into The Worm HoleDefCamp 2013 - MSF Into The Worm Hole
DefCamp 2013 - MSF Into The Worm HoleDefCamp
 
BSides Algiers - Metasploit framework - Oussama Elhamer
BSides Algiers - Metasploit framework - Oussama ElhamerBSides Algiers - Metasploit framework - Oussama Elhamer
BSides Algiers - Metasploit framework - Oussama ElhamerShellmates
 
01 Metasploit kung fu introduction
01 Metasploit kung fu introduction01 Metasploit kung fu introduction
01 Metasploit kung fu introductionMostafa Abdel-sallam
 
Nomura UCCSC 2009
Nomura UCCSC 2009Nomura UCCSC 2009
Nomura UCCSC 2009dnomura
 
Matrix, The Year To Date, Ben Parsons, TADSummit 2018
Matrix, The Year To Date, Ben Parsons, TADSummit 2018Matrix, The Year To Date, Ben Parsons, TADSummit 2018
Matrix, The Year To Date, Ben Parsons, TADSummit 2018Alan Quayle
 
John adams talk cloudy
John adams   talk cloudyJohn adams   talk cloudy
John adams talk cloudyJohn Adams
 
DC612 Day - Hands on Penetration Testing 101
DC612 Day - Hands on Penetration Testing 101DC612 Day - Hands on Penetration Testing 101
DC612 Day - Hands on Penetration Testing 101dc612
 
Configuration management with puppet
Configuration management with puppetConfiguration management with puppet
Configuration management with puppetJakub Stransky
 
CodeMotion Amsterdam 2018 - Microservices in action at the Dutch National Police
CodeMotion Amsterdam 2018 - Microservices in action at the Dutch National PoliceCodeMotion Amsterdam 2018 - Microservices in action at the Dutch National Police
CodeMotion Amsterdam 2018 - Microservices in action at the Dutch National PoliceBert Jan Schrijver
 
Microservices in action at the Dutch National Police - Bert Jan Schrijver - C...
Microservices in action at the Dutch National Police - Bert Jan Schrijver - C...Microservices in action at the Dutch National Police - Bert Jan Schrijver - C...
Microservices in action at the Dutch National Police - Bert Jan Schrijver - C...Codemotion
 
Metasploit (Module-1) - Getting Started With Metasploit
Metasploit (Module-1) - Getting Started With MetasploitMetasploit (Module-1) - Getting Started With Metasploit
Metasploit (Module-1) - Getting Started With MetasploitAnurag Srivastava
 
BSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad GuysBSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad GuysJoff Thyer
 
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class Chris Gates
 
stackconf 2020 | Replace your Docker based Containers with Cri-o Kata Contain...
stackconf 2020 | Replace your Docker based Containers with Cri-o Kata Contain...stackconf 2020 | Replace your Docker based Containers with Cri-o Kata Contain...
stackconf 2020 | Replace your Docker based Containers with Cri-o Kata Contain...NETWAYS
 
Sanger, upcoming Openstack for Bio-informaticians
Sanger, upcoming Openstack for Bio-informaticiansSanger, upcoming Openstack for Bio-informaticians
Sanger, upcoming Openstack for Bio-informaticiansPeter Clapham
 
Hot to build continuously processing for 24/7 real-time data streaming platform?
Hot to build continuously processing for 24/7 real-time data streaming platform?Hot to build continuously processing for 24/7 real-time data streaming platform?
Hot to build continuously processing for 24/7 real-time data streaming platform?GetInData
 
Metasploit For Beginners
Metasploit For BeginnersMetasploit For Beginners
Metasploit For BeginnersRamnath Shenoy
 

Similar a Open Source Cyber Weaponry (20)

Metasploitation part-1 (murtuja)
Metasploitation part-1 (murtuja)Metasploitation part-1 (murtuja)
Metasploitation part-1 (murtuja)
 
DefCamp 2013 - MSF Into The Worm Hole
DefCamp 2013 - MSF Into The Worm HoleDefCamp 2013 - MSF Into The Worm Hole
DefCamp 2013 - MSF Into The Worm Hole
 
BSides Algiers - Metasploit framework - Oussama Elhamer
BSides Algiers - Metasploit framework - Oussama ElhamerBSides Algiers - Metasploit framework - Oussama Elhamer
BSides Algiers - Metasploit framework - Oussama Elhamer
 
01 Metasploit kung fu introduction
01 Metasploit kung fu introduction01 Metasploit kung fu introduction
01 Metasploit kung fu introduction
 
Nomura UCCSC 2009
Nomura UCCSC 2009Nomura UCCSC 2009
Nomura UCCSC 2009
 
Matrix, The Year To Date, Ben Parsons, TADSummit 2018
Matrix, The Year To Date, Ben Parsons, TADSummit 2018Matrix, The Year To Date, Ben Parsons, TADSummit 2018
Matrix, The Year To Date, Ben Parsons, TADSummit 2018
 
John adams talk cloudy
John adams   talk cloudyJohn adams   talk cloudy
John adams talk cloudy
 
DC612 Day - Hands on Penetration Testing 101
DC612 Day - Hands on Penetration Testing 101DC612 Day - Hands on Penetration Testing 101
DC612 Day - Hands on Penetration Testing 101
 
Configuration management with puppet
Configuration management with puppetConfiguration management with puppet
Configuration management with puppet
 
CodeMotion Amsterdam 2018 - Microservices in action at the Dutch National Police
CodeMotion Amsterdam 2018 - Microservices in action at the Dutch National PoliceCodeMotion Amsterdam 2018 - Microservices in action at the Dutch National Police
CodeMotion Amsterdam 2018 - Microservices in action at the Dutch National Police
 
Microservices in action at the Dutch National Police - Bert Jan Schrijver - C...
Microservices in action at the Dutch National Police - Bert Jan Schrijver - C...Microservices in action at the Dutch National Police - Bert Jan Schrijver - C...
Microservices in action at the Dutch National Police - Bert Jan Schrijver - C...
 
Metasploit (Module-1) - Getting Started With Metasploit
Metasploit (Module-1) - Getting Started With MetasploitMetasploit (Module-1) - Getting Started With Metasploit
Metasploit (Module-1) - Getting Started With Metasploit
 
BSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad GuysBSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad Guys
 
Metasploit
MetasploitMetasploit
Metasploit
 
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
 
stackconf 2020 | Replace your Docker based Containers with Cri-o Kata Contain...
stackconf 2020 | Replace your Docker based Containers with Cri-o Kata Contain...stackconf 2020 | Replace your Docker based Containers with Cri-o Kata Contain...
stackconf 2020 | Replace your Docker based Containers with Cri-o Kata Contain...
 
Sanger, upcoming Openstack for Bio-informaticians
Sanger, upcoming Openstack for Bio-informaticiansSanger, upcoming Openstack for Bio-informaticians
Sanger, upcoming Openstack for Bio-informaticians
 
Flexible compute
Flexible computeFlexible compute
Flexible compute
 
Hot to build continuously processing for 24/7 real-time data streaming platform?
Hot to build continuously processing for 24/7 real-time data streaming platform?Hot to build continuously processing for 24/7 real-time data streaming platform?
Hot to build continuously processing for 24/7 real-time data streaming platform?
 
Metasploit For Beginners
Metasploit For BeginnersMetasploit For Beginners
Metasploit For Beginners
 

Más de Joshua L. Davis

Innovation Through “Trusted” Open Source Solutions
Innovation Through “Trusted” Open Source SolutionsInnovation Through “Trusted” Open Source Solutions
Innovation Through “Trusted” Open Source SolutionsJoshua L. Davis
 
The Open Source Movement
The Open Source MovementThe Open Source Movement
The Open Source MovementJoshua L. Davis
 
Mil-OSS @ 47th Annual AOC Convention
Mil-OSS @ 47th Annual AOC ConventionMil-OSS @ 47th Annual AOC Convention
Mil-OSS @ 47th Annual AOC ConventionJoshua L. Davis
 
The Next Generation Open IDS Engine Suricata and Emerging Threats
The Next Generation Open IDS Engine Suricata and Emerging ThreatsThe Next Generation Open IDS Engine Suricata and Emerging Threats
The Next Generation Open IDS Engine Suricata and Emerging ThreatsJoshua L. Davis
 
DISA's Open Source Corporate Management Information System (OSCMIS)
DISA's Open Source Corporate Management Information System (OSCMIS)DISA's Open Source Corporate Management Information System (OSCMIS)
DISA's Open Source Corporate Management Information System (OSCMIS)Joshua L. Davis
 
Ignite: Hackin' Excel with Ruby
Ignite: Hackin' Excel with RubyIgnite: Hackin' Excel with Ruby
Ignite: Hackin' Excel with RubyJoshua L. Davis
 
Ignite: Improving Performance on Federal Contracts Using Scrum & Agile
Ignite: Improving Performance on Federal Contracts Using Scrum & AgileIgnite: Improving Performance on Federal Contracts Using Scrum & Agile
Ignite: Improving Performance on Federal Contracts Using Scrum & AgileJoshua L. Davis
 
Ignite: Devops - Why Should You Care
Ignite: Devops - Why Should You CareIgnite: Devops - Why Should You Care
Ignite: Devops - Why Should You CareJoshua L. Davis
 
Using the Joomla CMI in the Army Hosting Environment
Using the Joomla CMI in the Army Hosting EnvironmentUsing the Joomla CMI in the Army Hosting Environment
Using the Joomla CMI in the Army Hosting EnvironmentJoshua L. Davis
 
Senior Leaders Adapting to Social Technologies
Senior Leaders Adapting to Social TechnologiesSenior Leaders Adapting to Social Technologies
Senior Leaders Adapting to Social TechnologiesJoshua L. Davis
 
Barcamp: Open Source and Security
Barcamp: Open Source and SecurityBarcamp: Open Source and Security
Barcamp: Open Source and SecurityJoshua L. Davis
 
Open Source Software (OSS/FLOSS) and Security
Open Source Software (OSS/FLOSS) and SecurityOpen Source Software (OSS/FLOSS) and Security
Open Source Software (OSS/FLOSS) and SecurityJoshua L. Davis
 
Importance of WS-Addressing and WS-Reliability in DoD Enterprises
Importance of WS-Addressing and WS-Reliability in DoD EnterprisesImportance of WS-Addressing and WS-Reliability in DoD Enterprises
Importance of WS-Addressing and WS-Reliability in DoD EnterprisesJoshua L. Davis
 
OZONE & OWF: A Community-wide GOTS initiative and its transition to GOSS
OZONE & OWF: A Community-wide GOTS initiative and its transition to GOSSOZONE & OWF: A Community-wide GOTS initiative and its transition to GOSS
OZONE & OWF: A Community-wide GOTS initiative and its transition to GOSSJoshua L. Davis
 
Title TBD: "18 hundred seconds"
Title TBD: "18 hundred seconds"Title TBD: "18 hundred seconds"
Title TBD: "18 hundred seconds"Joshua L. Davis
 
Reaching It's Potential: How to Make Government-Developed OSS A Major Player
Reaching It's Potential: How to Make Government-Developed OSS A Major PlayerReaching It's Potential: How to Make Government-Developed OSS A Major Player
Reaching It's Potential: How to Make Government-Developed OSS A Major PlayerJoshua L. Davis
 
Homeland Open Security Technologies (HOST)
Homeland Open Security Technologies (HOST)Homeland Open Security Technologies (HOST)
Homeland Open Security Technologies (HOST)Joshua L. Davis
 

Más de Joshua L. Davis (20)

Innovation Through “Trusted” Open Source Solutions
Innovation Through “Trusted” Open Source SolutionsInnovation Through “Trusted” Open Source Solutions
Innovation Through “Trusted” Open Source Solutions
 
The Open Source Movement
The Open Source MovementThe Open Source Movement
The Open Source Movement
 
Mil-OSS @ 47th Annual AOC Convention
Mil-OSS @ 47th Annual AOC ConventionMil-OSS @ 47th Annual AOC Convention
Mil-OSS @ 47th Annual AOC Convention
 
The Next Generation Open IDS Engine Suricata and Emerging Threats
The Next Generation Open IDS Engine Suricata and Emerging ThreatsThe Next Generation Open IDS Engine Suricata and Emerging Threats
The Next Generation Open IDS Engine Suricata and Emerging Threats
 
DISA's Open Source Corporate Management Information System (OSCMIS)
DISA's Open Source Corporate Management Information System (OSCMIS)DISA's Open Source Corporate Management Information System (OSCMIS)
DISA's Open Source Corporate Management Information System (OSCMIS)
 
Ignite: Hackin' Excel with Ruby
Ignite: Hackin' Excel with RubyIgnite: Hackin' Excel with Ruby
Ignite: Hackin' Excel with Ruby
 
Ignite: YSANAOYOA
Ignite: YSANAOYOAIgnite: YSANAOYOA
Ignite: YSANAOYOA
 
Ignite: Improving Performance on Federal Contracts Using Scrum & Agile
Ignite: Improving Performance on Federal Contracts Using Scrum & AgileIgnite: Improving Performance on Federal Contracts Using Scrum & Agile
Ignite: Improving Performance on Federal Contracts Using Scrum & Agile
 
Ignite: Devops - Why Should You Care
Ignite: Devops - Why Should You CareIgnite: Devops - Why Should You Care
Ignite: Devops - Why Should You Care
 
Using the Joomla CMI in the Army Hosting Environment
Using the Joomla CMI in the Army Hosting EnvironmentUsing the Joomla CMI in the Army Hosting Environment
Using the Joomla CMI in the Army Hosting Environment
 
Senior Leaders Adapting to Social Technologies
Senior Leaders Adapting to Social TechnologiesSenior Leaders Adapting to Social Technologies
Senior Leaders Adapting to Social Technologies
 
Barcamp: Open Source and Security
Barcamp: Open Source and SecurityBarcamp: Open Source and Security
Barcamp: Open Source and Security
 
Open Source Software (OSS/FLOSS) and Security
Open Source Software (OSS/FLOSS) and SecurityOpen Source Software (OSS/FLOSS) and Security
Open Source Software (OSS/FLOSS) and Security
 
SOSCOE Overview
SOSCOE OverviewSOSCOE Overview
SOSCOE Overview
 
milSuite
milSuitemilSuite
milSuite
 
Importance of WS-Addressing and WS-Reliability in DoD Enterprises
Importance of WS-Addressing and WS-Reliability in DoD EnterprisesImportance of WS-Addressing and WS-Reliability in DoD Enterprises
Importance of WS-Addressing and WS-Reliability in DoD Enterprises
 
OZONE & OWF: A Community-wide GOTS initiative and its transition to GOSS
OZONE & OWF: A Community-wide GOTS initiative and its transition to GOSSOZONE & OWF: A Community-wide GOTS initiative and its transition to GOSS
OZONE & OWF: A Community-wide GOTS initiative and its transition to GOSS
 
Title TBD: "18 hundred seconds"
Title TBD: "18 hundred seconds"Title TBD: "18 hundred seconds"
Title TBD: "18 hundred seconds"
 
Reaching It's Potential: How to Make Government-Developed OSS A Major Player
Reaching It's Potential: How to Make Government-Developed OSS A Major PlayerReaching It's Potential: How to Make Government-Developed OSS A Major Player
Reaching It's Potential: How to Make Government-Developed OSS A Major Player
 
Homeland Open Security Technologies (HOST)
Homeland Open Security Technologies (HOST)Homeland Open Security Technologies (HOST)
Homeland Open Security Technologies (HOST)
 

Último

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 

Último (20)

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 

Open Source Cyber Weaponry

  • 2. introduction Chief Security Founder & Chief Officer Architect
  • 3. background Perspective • 15 years of software development • 12 years of penetration testing • Involved in OSS since 1995 • Ex-USAF contractor
  • 4. 1999 Military contracting circa 1999 • Ultra-secretive and ultra-competitive • Teams furiously reinventing wheels • Open source was still “sketchy” • Little code sharing
  • 5. 1999 Security tools circa 1999 • Vulnerability scanning was still edgy • Penetration testing 100% manual • Offensive tools in their infancy • No comprehensive exploit toolkits • Teams hoarded modified public code
  • 6. 1999 “Cyber Weapons” circa 1999 • Shatter-your-drive-remotely stuff • Scary words and half-truths • Focused on DE, EMPs, etc
  • 8. today Military contracting today • Still ultra-secretive and ultra-competitive • Still reinventing well-defined wheels • Offense is becoming acceptable • More use of open-source code • Better informed customers
  • 9. today Security tools today • Vulnerability scanning is well understood • Penetration test automation is growing • Tons of commercial and OSS tools • Exploit code has been productized • Wide array of niche tools
  • 10. today “Cyber Weapons” today • Term usually reserved for offensive tools • Tons of contractors working on these • Similar requirements to commercial • No longer far from reality
  • 11. cyber weapons Offensive cyber tools • Common goals • Permissions and accountability • Usable by lightly-trained staff • Great attack visualization • Multiple tool integration • Modular design • Non-commercial projects exist (NETT) • Integration with defense is important
  • 12. cyber weapons Offensive components • Reconnaissance • Attack Vectors • Payloads • Control • Data
  • 13. cyber weapons The “cyber” sniff test • How portable is the target-facing software? • How do they add new exploit vectors? • How much is written in Java? • How big is their exploit team? • How big is their payload team? • How do they handle stealth? • Who are their security experts? • Does it work on real networks? • What targets are supported? • What OSS does it use?
  • 14. cyber weapons The Open Source requirement • Costs scale poorly with commercial deps • OSS security tools adapt faster • OSS provides transparency • OSS tools set a minimum bar
  • 15. cyber weapons Open Source components • Nmap for host & service detection • Snort or Suricata for traffic analysis • Metasploit for exploits and payloads • DRADIS for notes and reporting • Linux, PostgreSQL, Apache • Ruby, Perl, Python, PHP
  • 16. metasploit The Metasploit Framework • Created in the summer of 2003 • An exploit development platform • Licensed under New BSD • Popular and gigantic • Over 450,000 lines of code • Over 100,000 users/mo • ~600 exploit modules • ~200 payloads
  • 17. metasploit architecture LIBRARIES INTERFACES TOOLS Rex Console CLI MSF Core RPC PLUGINS MSF Base GUI MODULES Payloads Exploits Encoders Nops Aux
  • 18. metasploit Lego, for network attacks • Choose a specific exploit module • Choose a compatible payload • Configure options • Launch!
  • 19. metasploit 888 888 Y8P888 888 888 888 88888b.d88b. .d88b. 888888 8888b. .d8888b 88888b. 888 .d88b. 888888888 888 "888 "88bd8P Y8b888 "88b88K 888 "88b888d88""88b888888 888 888 88888888888888 .d888888"Y8888b.888 888888888 888888888 888 888 888Y8b. Y88b. 888 888 X88888 d88P888Y88..88P888Y88b. 888 888 888 "Y8888 "Y888"Y888888 88888P'88888P" 888 "Y88P" 888 "Y888 888 888 888 =[ metasploit v3.4.2-dev [core:3.4 api:1.0] + -- --=[ 578 exploits - 296 auxiliary + -- --=[ 212 payloads - 27 encoders - 8 nops =[ svn r9949 updated today (2010.08.03) msf >
  • 20. metasploit Advantages of a modular design • Extend framework with proprietary modules • Use your payloads with our exploits • Use our payloads with your exploits • Split work by classification level
  • 21. metasploit Automation with Metasploit • Create resource scripts with embedded Ruby • Create console plugins to add commands • Create new modules to drive a process • Call Ruby directly from the console prompt • Talk to the builtin XMLRPC daemon
  • 22. metasploit Platform requirements • Any recent Windows, BSD, or Linux • Ruby 1.8.7+ (including 1.9.x) • OpenSSL
  • 23. metasploit Exploit coverage • Linux (x86, ARM, MIPS, PowerPC) • Windows (x86, x64) • OS X (ARM, PowerPC, x86) • Solaris (x86, SPARC) • AIX (PowerPC) • IRIX (MIPS) • Java • PHP
  • 24. metasploit Payload features • The Meterpreter (Win32, PHP, Java) • Encrypted control channels • Extensible at runtime • Full OS control • Scriptable • Staged and unstaged command shells • Ruby-based C / ASM compiler • Post-exploitation scripting
  • 25. metasploit Additional modules • Over 200 modules for information gathering • Scan large networks for data leaks • Exploit logic bugs for access • Capture data from clients • Find new flaws
  • 26. metasploit Database support • Automatically store all gathered data • Track all events (commands, sessions) • Easily build reports from this data
  • 27. metasploit capabilities Stealth and evasion • Exploits and payloads are randomized • Exploits use custom protocol stacks • Low-level SMB, HTTP, RPC control • Timing and fragment evasion • Payloads never write to the disk • Limited forensic footprint • Simple to control
  • 28. metasploit capabilities Full support for IPv6 • Complete socket support and payloads • Great for compromising link-local Ips • Works great with real IPv6 links
  • 29. metasploit capabilities Infinitely customizable • Ruby lends to a flexible object model • Modify any code via loadable plugins • Override specific libraries
  • 30. metasploit capabilities Instant remote desktop hijack • Use the “vncinject” payload with any exploit • Instantly gain desktop access to the target • Even on logged-off systems
  • 32. metasploit capabilities Relay attacks through targets • Use the “meterpreter” payload type • Launch the exploit, gain a session • Set a route for the target’s network • Launch exploits from the first target • Working with Windows, PHP, Java
  • 33. metasploit capabilities Dump and pass Windows hashes • Dump the hashes from a Win32 target • Use any hash as the SMB password • Provides “psexec” to other targets • Uses our custom SMB protocol stack
  • 34. metasploit capabilities Search for and acquire evidence • Meterpreter scripts for find & download • Gather passwords and sensitive docs • Works for all Meterpreter platforms
  • 35. metasploit capabilities Interact with targeted users • Determine whether the user is idle • Install a hotkey hook inside of Winlogon • Force lock the user’s desktop • Read the captured password
  • 36. metasploit express Metasploit Express • Commercial product from Rapid7 • Not a fork, but a direct extension • Built by the same core team • Pays for OSS development • Uses the open APIs
  • 37.
  • 38. metasploit examples Mined the public NTP servers • Discovered over 21m NTP client systems • Resulted in a great map of infrastructure • Identified a potential 20Gbps DDoS risk • A single Metasploit module + console
  • 39. metasploit examples Scanned 3.1 billion IPs • Identifying vulnerable VxWorks devices • Resulted in a 100+ vendor CERT advisory • Also, a single Metasploit module • Took 3 days and $19
  • 40. summary Cyber is what you make of it • Most of the parts exist in OSS • Metasploit is easy to build on • Free to use, free to extend