SlideShare a Scribd company logo
CONFIDENCE
CONFERENCE
Analyzing Security Findigns the Easy Way
6 years later…
SECCUBUS
This work is licensed under a Creative Commons
Attribution-ShareAlike 4.0 International License.
CONFIDENCE
CONFERENCE
Frank Breedijk
• Security Officer at Schuberg Philis
• (Official) Security dude since 2000
• Author of Seccubus
Coordinates:
• fbreedijk@schubergphilis.com
• https://www.linkedin.com/in/seccubus
• @Seccubus on Twitter
Glenn ten Cate
• Mission Critical Engineer Security at Schuberg Philis
• Security Dude
• Author of Security Knowledge Framework
Coordinates:
• gtencate@schubergphilis
• https://nl.linkedin.com/pub/glenn-ten-cate/3b/11a/117
WHO ARE WE?
CONFIDENCE
CONFERENCE
Frustration
Being challanged
To make my life easier
WHY DID I START THE SECCUBUS PROJECT?
Y ? A CC NC ND image by Tehmina Goskar
https://www.flickr.com/photos/13114254@N00/119475590/
CONFIDENCE
CONFERENCE
C. Lueless
Mission:
• Mission: Perform a bi-weekly vulnerability scan of all our
public IP addresses
B. Rightlad
A STORY ABOUT TWO GUYS
These and all non-attributed photos of Frank Breedijk
are taken by Jan Jacob Bos
CONFIDENCE
CONFERENCE
C. LUELESS – TAKES A CLASSIC APPROACH
CONFIDENCE
CONFERENCE
GETTING UP WAY TO EARLY…
CONFIDENCE
CONFERENCE
… STARTING THE SCANNER IN THE
MAINTENANCE WINDOW…
CONFIDENCE
CONFERENCE
… WAITING …
CONFIDENCE
CONFERENCE
… ANALYSIS
CONFIDENCE
CONFERENCE
Scanners are written for consultants, not
operations
Scanners need to make a tradeoff between
false positives and false negatives
Most scanners produce an awfull lot of output
Scanning takes time, tools are poorly
automated
WHAT IS C. LUELESS’ PROBLEM?
CONFIDENCE
CONFERENCE
B. RIGHTLAD CHOOSES SECCUBUS
CONFIDENCE
CONFERENCE
CONFIGURATION IN THE MORNING
CONFIDENCE
CONFERENCE
… GO HOME …
CONFIDENCE
CONFERENCE
… RELAX …
CONFIDENCE
CONFERENCE
… THE SCAN RUNS AT NIGHT …
Image: Orion's Umbra, a CC NC image from
jahdakinebrah's photostream
CONFIDENCE
CONFERENCE
… IN THE MORNING …
CONFIDENCE
CONFERENCE
… ANALYZE AND REMEDIATE
CONFIDENCE
CONFERENCE
WHAT HAPPENED UNDER THE HOOD?
Do-scan
Nessus/sc
an
Nessus
.nessus
files
nessus2ivilIvil file
Load ivil
Database
CONFIDENCE
CONFERENCE
ALLABOUT STATUS
New
Open
No issue
CONFIDENCE
CONFERENCE
Is the work in balance with the profit?
BALANCE
A fine balance a CC NC ND Image by Anish B George
https://www.flickr.com/photos/22199070@N00/3311106984/
CONFIDENCE
CONFERENCE
TWO WEEKS LATER
Image: 1/365, a CC NC ND image from cubedude27's
photostream
CONFIDENCE
CONFERENCE
C. LUELESS – TAKES A CLASSIC APPROACH
CONFIDENCE
CONFERENCE
GETTING UP WAY TO EARLY…
CONFIDENCE
CONFERENCE
… STARTING THE SCANNER IN THE
MAINTENANCE WINDOW…
CONFIDENCE
CONFERENCE
… WAITING …
CONFIDENCE
CONFERENCE
… ANALYSIS
CONFIDENCE
CONFERENCE
WAS IT REALLY WORTH IT?
CONFIDENCE
CONFERENCE
B. RIGHTLAD CHOOSES SECCUBUS
CONFIDENCE
CONFERENCE
… GO HOME …
CONFIDENCE
CONFERENCE
… RELAX …
CONFIDENCE
CONFERENCE
… THE SCAN RUNS AT NIGHT …
Image: Half Moon, a CC NC ND image from
za3tooor's photostream
CONFIDENCE
CONFERENCE
… IN THE MORNING …
CONFIDENCE
CONFERENCE
… ANALYZE AND REMEDIATE
CONFIDENCE
CONFERENCE
ALLABOUT STATUS
New
Open
No issue
ChangedGone
Closed
Masked
CONFIDENCE
CONFERENCE
Don’t bother users with non-actionable findings
OK IS OK…
Woo a CC NC SA image by Rick Harrison
https://www.flickr.com/photos/81851211@N00/2682663297/
CONFIDENCE
CONFERENCE
ANOTHER TWO WEEKS PASS…
Image: Cosas hechas, a CC ND image from srgblog's
photostream
CONFIDENCE
CONFERENCE
C. LUELESS – TAKES A CLASSIC APPROACH
CONFIDENCE
CONFERENCE
GETTING UP WAY TO EARLY…
CONFIDENCE
CONFERENCE
… STARTING THE SCANNER IN THE
MAINTENANCE WINDOW…
CONFIDENCE
CONFERENCE
… WAITING …
CONFIDENCE
CONFERENCE
… ANALYSIS
CONFIDENCE
CONFERENCE
B. RIGHTLAD CHOOSES SECCUBUS
CONFIDENCE
CONFERENCE
… GO HOME …
CONFIDENCE
CONFERENCE
… RELAX …
CONFIDENCE
CONFERENCE
… THE SCAN RUNS AT NIGHT …
Image: Himalayan Moonrise, a CC NC ND image from
swamysk's photostream
CONFIDENCE
CONFERENCE
… IN THE MORNING …
CONFIDENCE
CONFERENCE
… ANALYZE AND REMEDIATE
CONFIDENCE
CONFERENCE
Succubus
In-Seccubus
Seccubus
WHAT IS IN A NAME?
CONFIDENCE
CONFERENCE
Monthly Seccubus runs means:
Scans are scheduled via crontab
Only the findings that need attention get it
Less errors due to less repetitave work.
The amount of effort is proportional to the amount of changes
Risk is proportional to the amount of changes
SO…
CONFIDENCE
CONFERENCE
COMPARE
Image: Apples & Oranges - They Don't Compare, a
CC image from thebusybrain's photostream
CONFIDENCE
CONFERENCE
REDUCE
Image: Slimmer, a CC NC ND image from mkmabus's
photostream
CONFIDENCE
CONFERENCE
6 YEARS AGO…
CONFIDENCE
CONFERENCE
ULTIMATE GOAL
Image: StuttgargoalRobin, a CC image from
dankamminga's photostream
CONFIDENCE
CONFERENCE
Name Seccubus chosen here at Confidence
Added new scanners
Wrote a new GUI
SECCUBUS HAS EVOLVED
Medusa
SSLyze
CONFIDENCE
CONFERENCE
Intermediate Vulnerability Information
Language
Intermediate format that allows tools to
interface and exchange findings
A LITTLE IVIL GOES A LONG WAY
Image: EVIL a CC NC SA image from krazydad's
photostream
CONFIDENCE
CONFERENCE
It does not try to capture everything
It does not try to fit each case
The specification is not 63 pages
Simple to read
Simple to write
Simple to use
Simple License (MIT)
Easy to integrate new tools into Seccubus
IVIL
CONFIDENCE
CONFERENCE
Joined Schuberg Philis 2 years ago
Main focus: Web Application Security
We need to integrate this into our pipeline
ENTER GLENN
Enter here a CC NC ND image by Anne Petersen
https://www.flickr.com/photos/60258967@N00/4183985730/
CONFIDENCE
CONFERENCE
Breaches are moving from layer 3 to
layer 7
There’s only so many security dudes to drive
the tools
Integrate into continuous delivery
WHY?
CONFIDENCE
CONFERENCE
Google’s web application security scanner
Open Source
Noisy
Not very subtile
Not production safe!
FIRST WIN: SKIPFISH
Skip w/ fish a CC NC ND image by AlBakker
https://www.flickr.com/photos/45213160@N00/206944920/
CONFIDENCE
CONFERENCE
Open source
Like Burp but free (as in speech)
Actively developed and maintained
OWASP Flag Ship Project
SECOND WIN: OWASP ZAP
IEEE Scrum a CC NC SA image by Jim Carson
https://www.flickr.com/photos/44124442504@N01/2208956607/
CONFIDENCE
CONFERENCE
Help developers write better code
Enable Security by Design
• Knowledge system for risk analysis
Code Securely
• Code examples
Check code before commit
• OWASP Application Security Verification Standard
Newly adopted as OWASP Project
SECURITY KNOWLEDGE FRAMEWORK
Moving Hacks a CC NC SA image by Brian Sawyer
https://www.flickr.com/photos/45609637@N00/229360390/
CONFIDENCE
CONFERENCE
Coding
• Perl
• Angular
Requirements
• What do you want
Testers
• Challenge the quality of our crack ;)
Documentation
• Help us get new users
Users
SECCUBUS CAN USE YOUR HELP
Image: Hang On, a CC NC ND image from
brraveheart's photostream
CONFIDENCE
CONFERENCE
First public preview of
new interface
SNEAK PREVIEW
"Celebs" a cc by nc sa licensed photo by Nick Sherman:
http://flickr.com/photos/nicksherman/4145966095/
Automated Security Testing with Seccubus confidence 2015
Automated Security Testing with Seccubus confidence 2015
Automated Security Testing with Seccubus confidence 2015
CONFIDENCE
CONFERENCE
New user interface (RSN)
Start/schedule scans from the GUI
Integration with Security Knowledge
Framework
Add user/rights management
Track issues as well as findings
Reporting
More???
ROADMAP
Albany NY 1950 a CC image by david
https://www.flickr.com/photos/23465812@N00/6877290919/
CONFIDENCE
CONFERENCE
www.seccubus.com
QUESTIONS
Image: What now?, a CC ND image from laurenclose's photostream
CONFIDENCE
CONFERENCE
Frank Breedijk
• Security Officer at Schuberg Philis
• (Official) Security dude since 2000
• Author of Seccubus
Coordinates:
• fbreedijk@schubergphilis.com
• https://www.linkedin.com/in/seccubus
• @Seccubus on Twitter
Glenn ten Cate
• Mission Critical Engineer Security at Schuberg Philis
• Security Dude
• Author of Security Knowledge Framework
Coordinates:
• gtencate@schubergphilis
• https://nl.linkedin.com/pub/glenn-ten-cate/3b/11a/117
WHO ARE WE?

More Related Content

PDF
Data Days 2014 - Matt Weiden
PPTX
Content Delivery in an On-Demand Age
PDF
The Blameless Cloud: Bringing Actionable Retrospectives to Salesforce
PDF
Operational Software Design
PDF
Enterprise Vulnerability Management - ZeroNights16
PPTX
We Heart It Powerpoint FIT 1050
PDF
Nessus and Reporting Karma
PPTX
Design Practices for a Secure Azure Solution
Data Days 2014 - Matt Weiden
Content Delivery in an On-Demand Age
The Blameless Cloud: Bringing Actionable Retrospectives to Salesforce
Operational Software Design
Enterprise Vulnerability Management - ZeroNights16
We Heart It Powerpoint FIT 1050
Nessus and Reporting Karma
Design Practices for a Secure Azure Solution

Viewers also liked (20)

PPTX
2015 Halifax Index Presentation
PDF
#ForoEGovAR | Plataforma UNKSOC.ORG y Desarrollo de la Comunidad
PDF
Baseline & impact assessments & lessons learnt: UTZ Certified Ghana and Ivory...
PPTX
RESTful Web Services @AnkaraPHP meetup
PDF
Beyond xUnit example-based testing: property-based testing with ScalaCheck
PDF
Hellomynameis,lindsayhoward
PPTX
#myHFXpledge
PPTX
Flat plans
PPTX
Rene descartes
PPT
Blue wrap recycling
KEY
Boris Chan - FITC SCREENS - Becoming Social By Default on Mobile
PPTX
Pres
PDF
How to use ustream producer
PDF
Strategic research agenda for cocoa coffee Wageningen UR 09062014
PDF
The Image Of Den helder
PPT
Samsung Monitor
PDF
Entity Linking via Graph-Distance Minimization
PDF
User-centred innovation at Digital World Research Centre
PPTX
Q4 evaluation
2015 Halifax Index Presentation
#ForoEGovAR | Plataforma UNKSOC.ORG y Desarrollo de la Comunidad
Baseline & impact assessments & lessons learnt: UTZ Certified Ghana and Ivory...
RESTful Web Services @AnkaraPHP meetup
Beyond xUnit example-based testing: property-based testing with ScalaCheck
Hellomynameis,lindsayhoward
#myHFXpledge
Flat plans
Rene descartes
Blue wrap recycling
Boris Chan - FITC SCREENS - Becoming Social By Default on Mobile
Pres
How to use ustream producer
Strategic research agenda for cocoa coffee Wageningen UR 09062014
The Image Of Den helder
Samsung Monitor
Entity Linking via Graph-Distance Minimization
User-centred innovation at Digital World Research Centre
Q4 evaluation
Ad

Similar to Automated Security Testing with Seccubus confidence 2015 (20)

PDF
API Training 10 Nov 2014
PPTX
Penetration testing dont just leave it to chance
PDF
Strategies for Web Application Security
PDF
Strategies for Web Application Security
PDF
Acunetix Training and ScanAssist
PDF
Defcon 23 - damon small - beyond the scan
PPTX
Hacker Halted Miami , USA 2010
PPTX
Using Assessment Tools on ICS (English)
PDF
Beyond the Scan: The Value Proposition of Vulnerability Assessment
PDF
Cloud penetrator-hakin9-review-march-2012
PPTX
Bringing CD to the DoD
PPTX
Aksit profile final
PPTX
AKS IT Corporate Presentation
PPTX
Security Testing.pptx
PPT
Security Testing
PPTX
Domain 6 - Security Assessment and Testing
PPTX
Security testing fundamentals
PPTX
Security assessment with a hint of CISSP Prep
PPT
Practical Security Architecture Analysis
API Training 10 Nov 2014
Penetration testing dont just leave it to chance
Strategies for Web Application Security
Strategies for Web Application Security
Acunetix Training and ScanAssist
Defcon 23 - damon small - beyond the scan
Hacker Halted Miami , USA 2010
Using Assessment Tools on ICS (English)
Beyond the Scan: The Value Proposition of Vulnerability Assessment
Cloud penetrator-hakin9-review-march-2012
Bringing CD to the DoD
Aksit profile final
AKS IT Corporate Presentation
Security Testing.pptx
Security Testing
Domain 6 - Security Assessment and Testing
Security testing fundamentals
Security assessment with a hint of CISSP Prep
Practical Security Architecture Analysis
Ad

Recently uploaded (20)

PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Hybrid model detection and classification of lung cancer
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PPTX
Modernising the Digital Integration Hub
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Architecture types and enterprise applications.pdf
PDF
Five Habits of High-Impact Board Members
PPTX
Tartificialntelligence_presentation.pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
Zenith AI: Advanced Artificial Intelligence
Hybrid model detection and classification of lung cancer
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
DP Operators-handbook-extract for the Mautical Institute
sustainability-14-14877-v2.pddhzftheheeeee
observCloud-Native Containerability and monitoring.pptx
Hindi spoken digit analysis for native and non-native speakers
A contest of sentiment analysis: k-nearest neighbor versus neural network
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Modernising the Digital Integration Hub
Assigned Numbers - 2025 - Bluetooth® Document
Module 1.ppt Iot fundamentals and Architecture
Architecture types and enterprise applications.pdf
Five Habits of High-Impact Board Members
Tartificialntelligence_presentation.pptx
Group 1 Presentation -Planning and Decision Making .pptx

Automated Security Testing with Seccubus confidence 2015