O slideshow foi denunciado.
Utilizamos seu perfil e dados de atividades no LinkedIn para personalizar e exibir anúncios mais relevantes. Altere suas preferências de anúncios quando desejar.

How to be an InfoSec Geek

Overview of resources to be an InfoSec Geek: Twitter, Blogs, Free Resources, Technical Training, Lab Setup, Vulnerable VMs, Pcap/Malware Resources, Python Scripting, Books, Conferences, CTFs

  • Entre para ver os comentários

How to be an InfoSec Geek

  1. 1. Resources for Technical Skill Progression How to be an InfoSec Geek
  2. 2. Table of Contents • Overview • Twitter • Security Blogs • RSS Reader • Free Resources for Skill Progression • Technical Security Training and Certifications • Lab Setup • Vulnerable VMs • Pcap Resources • Malware Repositories • Python Scripting Resources • Books • Conferences • Security Podcasts • Capture The Flags (CTFs) • Summary
  3. 3. Overview • Staying updated is a critical part of being an InfoSec Geek • This presentation will divide staying updated in two categories: – Latest Vulnerabilities, Threat Intelligence, Exploits, Tools, etc. – Updating Skills and Continuous Learning • We wont be covering everything, but hopefully enough to get you started
  4. 4. Overview Cont. • In order to continue to be technical in InfoSec you need to be devoted to continuous learning • We will cover a large array of topics within InfoSec. My advice is pick an area you enjoy and dive as deep as you can go into that topic • Lab, lab, lab: Technical skills are best built through hands on experience
  5. 5. Twitter • Twitter: The best resource for staying up to date. – News is tweeted before blogged! – Some people to follow to get your network started: • @TrustedSec, @deepimpactio, @redteamsblog, @ModSecurity, @carnal0wnage, @everythingburp, @brutelogic, @sqlmap, @sansappsec, @acunetix, @PrimalSec, @PortSwigger, @n1tr0g3n_com, @sethmisenar, @secureideas, @nVisium, @Burp_Suite, @JardineSoftware, @g0tmi1k, @mubix, @exploitdb,@lanmaster53, @secureideasllc, @SpiderLabs, @TheHackersNews, @threatpost, @briankrebs, @alienvault, @FireEye, @offsectraining, @jaimeblascob, @hdmoore, @malwaremustdie
  6. 6. Twitter Cont. • The slide above can be used to get your twitter profile and network started • You’ll want to continue to follow people that tweet out interesting news to build out your network • I normally quickly scan through twitter once an hour to grab news
  7. 7. Security Blogs • Some Blogs to Follow: – http://thehackernews.com/ – https://isc.sans.edu/ – https://www.reddit.com/ – http://www.theregister.co.uk/ – http://krebsonsecurity.com/ – http://threatpost.com/ – https://www.alienvault.com/open-threat-exchange/blog – http://www.fireeye.com/blog/ – http://blog.spiderlabs.com/ – http://blog.nvisium.com/ – http://www.exposedbotnets.com/ – http://blogs.technet.com/b/srd/ – http://malware.dontneedcoffee.com/
  8. 8. Security Blogs Cont. • Some Blogs to Follow Cont.: – http://packetstormsecurity.com/ – http://www.lanmaster53.com/ – https://www.trustedsec.com/news-and-events/ – http://www.acunetix.com/blog/ – http://blog.portswigger.net/ – https://www.jardinesoftware.net/ – https://www.corelan.be/ – https://blog.g0tmi1k.com/ – http://www.room362.com/ – http://www.exploit-db.com/ – http://carnal0wnage.attackresearch.com/ – http://malwaremustdie.org/ – http://www.reddit.com/r/ReverseEngineering/comments/is2et/can_we_colle ct_interesting_reverse_engineering/
  9. 9. RSS Reader • Setting up an RSS reader can help you keep track of blogs • I tend to favor the twitter route, but many prefer the RSS route • Many RSS readers available, I have had good experience using digg reader: – http://digg.com/reader • Some people like using feedly: – https://feedly.com/
  10. 10. Free Resources for Skill Progression Useful Resources (Free Courses, Tutorials, etc.): • Pentesterlab.com: Great labs and tutorials for web app testing – https://www.pentesterlab.com/ • Metasploit Unleashed: Free course on Metasploit – http://www.offensive-security.com/metasploit-unleashed/Main_Page • OWASP: Loads of free resources on web application security – https://www.owasp.org/index.php/Main_Page – OWASP AppSec Tutorial Series: https://www.owasp.org/index.php/OWASP_Appsec_Tutorial_Series • Open Security Training: Many free InfoSec courses – http://opensecuritytraining.info/Training.html • Great Read on Web Application Hacking: – http://www.gironsec.com/WebHacking101.pdf
  11. 11. Free Resources for Skill Progression Cont. Useful Resources (Free Courses, Tutorials, etc.) Cont.: • Youtube (resources) – Loads of good conference talks: https://www.youtube.com/user/irongeek – 12 Part Web Hacking Course: https://www.youtube.com/watch?v=rNkR1Joz4eU • Most Security Conference Talks are uploaded to Slideshare: – http://www.slideshare.net • FuzzySecurity: Good exploit tutorials – http://www.fuzzysecurity.com/ • Nvision Security Casts: Free web application security training videos – https://www.seccasts.com/mror/ • Free Reverse Engineering and IDA Pro Course: – http://www.woodmann.com/TiGa/ • Reverse Engineering blog and tutorials: – http://www.xchg.info/
  12. 12. Free Resources for Skill Progression Cont. • G0tmilk’s Blog: Good exploit tutorials and privilege escalation guides – https://blog.g0tmi1k.com/ • Pauldotcom Security Weekly: Podcast, news, tutorials: – http://securityweekly.com/ • Good blog and tutorial series for web application penetration testing: – https://www.pentestgeek.com/2014/07/02/burp-suite-tutorial-1/ • Metasploit Minute by Hak5: – https://www.youtube.com/playlist?list=PLW5y1tjAOzI3n4KRN_ic8N8Q v_ss_dh_F
  13. 13. Free Resources for Skill Progression Cont. • Corelan: Good exploit tutorials – https://www.corelan.be/ • Unofficial Kali Documentation “pwnwiki”: – https://github.com/pwnwiki/kaliwiki • List and Descriptions of top 125 security tools: – http://sectools.org/ • SecurityTube: Loads of free videos and tutorials – http://www.securitytube.net/ • Great paper on PHP source code analysis: – http://www.exploit-db.com/papers/12871/
  14. 14. Free Resources for Skill Progression Cont. • Code Academy: Good HTML/CSS, PHP, JavaScript courses – http://www.codecademy.com/ • W3 Schools: HTML/CSS, PHP, JavaScript, JQuery, tutorials – http://www.w3schools.com/ • Ruby Monk: Interactive Ruby Tutorials – https://rubymonk.com/ • Learn Java: Interactive Java Tutorial – http://www.learnjavaonline.org/
  15. 15. Technical Security Training and Certifications • Offensive Security: OSWP, OSCP, OSCE, OSWE, OSEE – http://www.offensive-security.com/ – Extremely hands on and lab oriented training. There is no hand holding you need to “Try Harder”. Their premier course, Penetration Testing with Kali (PWK) simulates a real penetration test throughout the lab and exam. • Good price for the training and labs (~1k/course and 90 days lab access) • The exams are hands on demonstrations of skills vs. multiple choice questions • SANS: GCIH, GCIA, GPEN, GWAPT, GWEB, GREM, GCFA, etc. – http://www.sans.org/ – These courses are designed to be 5-6 day crash courses on a topic. SANS training is less hands on compared to Offensive Security, but SANS does make a decent effort to incorporate labs. • Very good instruction and both offensive and defensive content • Costly training (~5k/course)
  16. 16. Technical Security Training and Certifications Cont. • SecurityTube: Loads of good tutorials and full courses – http://www.securitytube.net/ – Good price($200-300), some courses are free • Pentester Academy: Similar content as SecurityTube just a montly subscription ($40/month) – http://www.pentesteracademy.com/ • eLearnSecurity: Many different courses, all with labs – https://www.elearnsecurity.com/ – Good price (~1k w/lab access) • DerbyCon: Excellent security conference with training few days before the conference – https://www.derbycon.com/training-courses/ – Good price (1k for conference ticket and training)
  17. 17. Lab Setup • In order to keep your technical skills sharp you need to have a lab • Labs don’t have to be complex or really cost you any additional money • Virtualbox is a free virtualization platform that allows you to deploy VMs and network them together with ease using “Host -only” networking: – http://www.virtualbox.org/manual/ch01.html
  18. 18. Lab Setup Cont. • If you have some hardware to play with you might consider building a VMware ESXi server: – http://www.virtualizationadmin.com/articles-tutorials/ vmware-esx-and-vsphere-articles/ installation-and-deployment/getting-started- esxi-5-part1.html • Amazon Web Services (AWS) offers free tier servers that could extend your lab: – http://aws.amazon.com/free/
  19. 19. Vulnerable VMs • Practicing against a vulnerable VM is a great way to sharpen your skills • Vulnhub.com is an excellent resource to download vulnerable VMs and practice your TTPs against the VMs – Practice attacking the VMs before you read the write ups – Collection of many different vulnerable VMs • Great way to get a quick lab setup
  20. 20. Vulnerable VMs Cont. • Metasploitable: – www.rapid7.com/metasploitable • Kioptrix Challenges: – http://www.kioptrix.com/blog/test-page/ • WebGoat: – https://www.owasp.org/index.php/Category:OWASP_WebGoat_Project • RailsGoat: – http://railsgoat.cktricky.com/ • Damn Vulnerable Web App(DVWA): – http://www.dvwa.co.uk/
  21. 21. Vulnerable VMs Cont. • Mutillidae: – https://www.owasp.org/index.php/Category:OWASP_Mutillidae • SQLol: – http://blog.spiderlabs.com/2012/01/introducing-sqlol.html • Exploit KB / exploit.co.il Vulnerable Web App: – http://exploit.co.il/projects/vuln-web-app/ • OWASP Hackademic Challenges Project: – https://www.owasp.org/index.php/OWASP_Hackademic_Challe nges_Project
  22. 22. Vulnerable VMs Cont. • Hack.me: Web Application hacking challenges – https://hack.me/101229/web-app-hack-tutorial.html • XSSeducation: – https://hack.me/101136/xss-education.html • PyGoat: – https://www.owasp.org/index.php/OWASP_Pygoat_Project • Google’s Firing Squad: – http://public-firing-range.appspot.com/ • Labs associated with Web Application Hackers Handbook v2 – http://mdsec.net/
  23. 23. Pcap Resources • Netresec has compiled a large compilation of pcap resources from malware, CTFs, and other cyber challenges: – http://www.netresec.com/?page=PcapFiles • Pcap from malware: – http://contagiodump.blogspot.com/2013/08/dee pend-research-list-of-malware-pcaps.html
  24. 24. Malware Repositories • Large Summary of Malware Resources: – http://contagiodump.blogspot.com/2010/11/links-and-resources-for-malware- samples.html • Contagio Blog: – http://contagiodump.blogspot.com/ • Kernelmode: – http://www.kernelmode.info/forum/ • Malware.lu: – https://www.malware.lu/ • Malshare: – http://malshare.com/
  25. 25. Malware Repositories Cont. • Malwr: – https://malwr.com/ • MalwareChannel: – https://twitter.com/MalwareChannel • VirusShare: – http://virusshare.com/ • OpenMalware: – http://openmalware.org/
  26. 26. Python Scripting • You really need to break down and learn a scripting language. – I highly suggest that language be Python  • Start out learning the syntax and then start to solve simple problems: – Build a web parsing script, port scanner, automate OS commands, etc. • You will need to set aside some time to practice regularly in order to grow this skill • Scripting helps any technical security position
  27. 27. Python Scripting Cont.: Resources • Resources to Learn Python: – Books (Violent Python, Black Hat Python, Gray Hat Python) – Python tutorials: • https://docs.python.org/2/tutorial/ • https://wiki.python.org/moin/BeginnersGuide/Programmers • http://www.primalsecurity.net/tutorials/python-tutorials/ • http://www.codecademy.com/en/tracks/python • https://www.youtube.com/user/DrapsTV/playlists – Python Courses: • Google’s Free Python course: – https://developers.google.com/edu/python/ • SecurityTube.net’s Python Scripting Expert course: – http://www.securitytube-training.com/online-courses/securitytube-python-scripting- expert/
  28. 28. Books • Really good summary of InfoSec Books: – http://www.dfir.org/?q=node/8 • Safari Books is a great resource that allows you to view large library of books by paying a monthly fee: – https://www.safaribooksonline.com/ • Web Application Hackers Handbook v2: – http://www.amazon.com/The-Web-Application-Hackers-Handbook/dp/1118026470 • Violent Python: – http://www.amazon.com/Violent-Python-Cookbook-Penetration-Engineers-ebook/dp/B00ABY67JS • Black Hat Python: – http://www.amazon.com/Black-Hat-Python-Programming-Pentesters/dp/1593275900 • Gray Hat Python: – http://www.amazon.com/Gray-Hat-Python-Programming-Engineers/dp/1593271921
  29. 29. Books Cont. • Red Team Field Manual: – http://www.amazon.com/Rtfm-Red-Team-Field-Manual/dp/1494295504 • Blue Team Handbook: – http://www.amazon.com/Blue-Team-Handbook-condensed- Responder/dp/1500734756/ • Malware Analyst Cookbook: – http://www.amazon.com/Malware-Analysts-Cookbook-DVD-Techniques/ dp/0470613033/ • Practical Malware Analysis: – http://www.amazon.com/Practical-Malware-Analysis-Dissecting- Malicious/dp/1593272901/ • The Art of Memory Forensics: – http://www.amazon.com/The-Art-Memory-Forensics- Detecting/dp/1118825098
  30. 30. Books Cont. • Metasploit: The Penetration Testers Guide: – http://www.amazon.com/Metasploit-The-Penetration-Testers-Guide/dp/159327288X • Database Hackers Handbook: – http://www.amazon.com/The-Database-Hackers-Handbook-Defending/dp/0764578014 • Linux In A Nutshell: – http://www.amazon.com/gp/product/0596154488/ • TCP/IP Illustrated v2: – http://www.amazon.com/TCP-Illustrated-Protocols-Addison-Wesley- Professional/dp/0321336313/ • Free Introduction to Penetration Testing E-book: – http://averagesecurityguy.info/2014/10/30/beginners-guide-to-pentesting/
  31. 31. Books Cont. • The IDA Pro Book: – http://www.amazon.com/The-IDA-Pro-Book- Disassembler/dp/1593272898/ • The Shellcoder’s Handbook: – http://www.amazon.com/The-Shellcoders-Handbook-Discovering- Exploiting/dp/047008023X/ • Practical Reverse Engineering: – http://www.amazon.com/Practical-Reverse-Engineering-Reversing- Obfuscation/dp/1118787315/ • Hacking: The Art of Exploitation: – http://www.amazon.com/Hacking-The-Art-Exploitation- Edition/dp/1593271441/
  32. 32. Security Podcasts • Pauldotcom Security Weekly Webcast/Podcast: – http://securityweekly.com/ • Securabit Podcast: – http://securabit.libsyn.com/ • Social Engineer Podcast: – http://www.social-engineer.org/category/podcast/ • Breaking Down Security Podcast: – http://brakeingsecurity.com/ • SANS Internet Storm Center Podcasts: – https://isc.sans.edu/podcast.html • DevelopSec Podcast: – http://developsec.libsyn.com/
  33. 33. Security Podcasts Cont. • Risky Business Podcast: – http://risky.biz/netcasts/risky-business • Defensive Security Podcast: – http://www.defensivesecurity.org/category/podcast/ • Trustwave SpiderLabs Radio: – http://blog.spiderlabs.com/spiderlabs-radio/ • Primal Security Podcast: – www.primalsecurity.net • Down the Security Rabbithole Podcast: – http://podcast.wh1t3rabbit.net/ • OWASP Podcast: – https://www.owasp.org/index.php/OWASP_Podcast
  34. 34. Conferences • Large list of security conferences: – http://www.concise-courses.com/security/conferences-of-2014/ • DerbyCon – Louisville Kentucky in September. The conference talks are put on Youtube next day – https://www.derbycon.com/ • ShmooCon – Washington DC in January. Defensive conference and tickets sell out quickly – http://www.shmoocon.org/ • Black Hat – Vegas in August. Very commercialized conference, many good talks are mirrored at Defcon – http://www.blackhat.com/ • Def Con – Vegas in August. Very packed, lots of good talks – https://www.defcon.org/
  35. 35. Conferences Cont. • Bsides – Happen all the time depending on the region. Smaller conference, that is more community driven – http://www.securitybsides.com/ • ISSA – Different chapter conferences are held throughout the year: – http://www.issa.org • OWASP AppSec – Denver in September. Very focused on application security and secure coding best practices and trends. Many talks make it to YouTube: – www.appsecusa.org • NoVA Hackers – Monthly meetup in VA (2nd Monday of every month) – they do conference talks and host a CTF: – http://novahackers.blogspot.com/ • RVAsec – Holds a smaller local conference and CTF in June – http://rvasec.com/
  36. 36. Capture The Flags (CTFs) • Good write-up CTFs for people who have no experience: – http://webbreacher.blogspot.com/2014/10/top-5-ctf-tips-from-no-longer-ctf-virgin.html • CyberLympics: – http://cyberlympics.org/ • Maryland Cyber Challenge: – https://www.fbcinc.com/e/cybermdconference/challenge.aspx • DerbyCon CTF: – https://twitter.com/derbyconctf • Def Con CTF: – https://www.defcon.org/html/links/dc-ctf.html • Ruxcon: – https://ruxcon.org.au/slides/
  37. 37. Capture The Flags (CTFs) Cont. • CSAW NYU School of Engineering CTF – Good Write-ups online: – http://gaasedelen.blogspot.co.uk/2014/11/landing-agres-links-500-csaw-ctf-2014.html • CTF365: – https://ctf365.com/ • MITRE CTF: – http://mitrecyberacademy.org/competitions/index.html • CCDC (College-level) Challenge: – http://www.nationalccdc.org/index.php/component/content/ • Hack.lu CTF: – http://2014.hack.lu/index.php/CaptureTheFlag • RVAsec CTF: – http://rvasec.com/
  38. 38. Summary • In order to stay up to date in InfoSec you need to constantly strive for new skills and knowledge • Staying up to date on the latest vulnerabilities, exploits, tools, etc. requires the person diligently search the internet for news – We strongly suggest keeping an eye on twitter throughout the day • Build, break, secure, and learn to write code

×