SlideShare a Scribd company logo
Be Mean toYour Code
with Gauntlt
free phone calls
1337 tools
“[RISK ASSESSMENT] INTRODUCES A
DANGEROUS FALLACY:THAT
STRUCTURED INADEQUACY IS
ALMOST AS GOOD AS ADEQUACY
AND THAT UNDERFUNDED
SECURITY EFFORTS PLUS RISK
MANAGEMENT ARE ABOUT AS
GOOD AS PROPERLY FUNDED
SECURITY WORK” - MICHAL ZALEWSKI
“Is this Secure?”
-Your Customer
“It’s Certified”
-You
there’s a better way
Your app
sslyze
dirb
nmap
curl
sqlmapgarmr
You
generic
Put your code through the Gauntlet
security tools are confusing
Gauntlt allows dev and ops and
security to communicate
$ gem install gauntlt
install gauntlt
Feature: nmap attacks for example.com
Background:
Given "nmap" is installed
And the following profile:
| name | value |
| hostname | example.com |
| tcp_ping_ports | 22,25,80,443 |
Scenario: Verify server is open on expected ports
When I launch an "nmap" attack with:
"""
nmap -F <hostname>
"""
Then the output should contain:
"""
80/tcp open https
"""
Scenario: Verify that there are no unexpected ports open
When I launch an "nmap" attack with:
"""
nmap -F <hostname>
"""
Then the output should not contain:
"""
25/tcp
"""
Given
When
Then
When
Then
$ gauntlt
Feature: nmap attacks for example.com
Background:
Given "nmap" is installed
And the following profile:
| name | value |
| hostname | example.com |
| tcp_ping_ports | 22,25,80,443 |
Scenario: Verify server is open on expected ports
When I launch an "nmap" attack with:
"""
nmap -F www.example.com
"""
Then the output should contain:
"""
443/tcp open https
"""
1 scenario (1 failed)
5 steps (1 failed, 4 passed)
0m18.341s
running gauntlt with failing tests
$ gauntlt
Feature: nmap attacks for example.com
Background:
Given "nmap" is installed
And the following profile:
| name | value |
| hostname | example.com |
| tcp_ping_ports | 22,25,80,443 |
Scenario: Verify server is open on expected ports
When I launch an "nmap" attack with:
"""
nmap -F www.example.com
"""
Then the output should contain:
"""
443/tcp open https
"""
1 scenario (1 passed)
5 steps (5 passed)
0m18.341s
running gauntlt with passing tests
Feature: nmap attacks for example.com
Background:
Given "nmap" is installed
And the following profile:
| name | value |
| hostname | example.com |
| tcp_ping_ports | 22,25,80,443 |
Scenario: Verify server is open on expected ports
When I launch an "nmap" attack with:
"""
nmap -F <hostname>
"""
Then the output should contain:
"""
80/tcp open https
"""
Scenario: Verify that there are no unexpected ports open
When I launch an "nmap" attack with:
"""
nmap -F <hostname>
"""
Then the output should not contain:
"""
25/tcp
"""
setup steps
verify
tool
set
config
Feature: nmap attacks for example.com
Background:
Given "nmap" is installed
And the following profile:
| name | value |
| hostname | example.com |
| tcp_ping_ports | 22,25,80,443 |
Scenario: Verify server is open on expected ports
When I launch an "nmap" attack with:
"""
nmap -F <hostname>
"""
Then the output should contain:
"""
80/tcp open https
"""
Scenario: Verify that there are no unexpected ports open
When I launch an "nmap" attack with:
"""
nmap -F <hostname>
"""
Then the output should not contain:
"""
25/tcp
"""
attack
get
config
Feature: nmap attacks for example.com
Background:
Given "nmap" is installed
And the following profile:
| name | value |
| hostname | example.com |
| tcp_ping_ports | 22,25,80,443 |
Scenario: Verify server is open on expected ports
When I launch an "nmap" attack with:
"""
nmap -F <hostname>
"""
Then the output should contain:
"""
80/tcp open https
"""
Scenario: Verify that there are no unexpected ports open
When I launch an "nmap" attack with:
"""
nmap -F <hostname>
"""
Then the output should not contain:
"""
25/tcp
"""
assert
needle
haystack
Supported Tools
curl
nmap
sslyze
Garmr
dirb
generic
get started with gauntlt
github/gauntlt
gauntlt.org
videos
tutorials
@gauntlt
IRC #gauntlt
we
help!
start here
cool
vids!
be mean to your code
and win!
slideshare.com/wickett

More Related Content

PDF
Run your code through the Gauntlt
PDF
Be Mean to Your Code
PDF
Staying Sane with Nagios
PDF
amani_rwc_password
PDF
Nessus and Reporting Karma
PDF
HashiCorp Vault Workshop:幫 Credentials 找個窩
PPTX
Security Hole #11 - Unusual security vulnerabilities - Yuriy Bilyk
PDF
DevOpsDays - DevOps: Security 干我何事?
Run your code through the Gauntlt
Be Mean to Your Code
Staying Sane with Nagios
amani_rwc_password
Nessus and Reporting Karma
HashiCorp Vault Workshop:幫 Credentials 找個窩
Security Hole #11 - Unusual security vulnerabilities - Yuriy Bilyk
DevOpsDays - DevOps: Security 干我何事?

What's hot (20)

PDF
Managing secrets at scale
PDF
Vault 1.1: Secret Caching with Vault Agent and Other New Features
PPTX
My Bro The ELK
PPTX
Red Team vs Blue Team on AWS - RSA 2018
PPTX
lightning talk proposal
PDF
Modern Exploitation: Owning All of the Things
PPTX
Vault - Secret and Key Management
PPTX
Vulnerability intelligence with vulners.com / Кирилл Ермаков, Игорь Булатенко...
PDF
Putting Rugged Into your DevOps Toolchain
PDF
Extending Zeek for ICS Defense
PDF
Chickens & Eggs: Managing secrets in AWS with Hashicorp Vault
PPTX
Death of WAF - GoSec '15
PDF
Death of Web App Firewall
PPTX
I hunt sys admins 2.0
PPTX
Keeping a Secret with HashiCorp Vault
PDF
HTTP For the Good or the Bad
PDF
ContainerDays Boston 2016: "Hiding in Plain Sight: Managing Secrets in a Cont...
PPTX
ModSecurity and NGINX: Tuning the OWASP Core Rule Set - EMEA (Updated)
PPTX
BlueHat v17 || Scaling Incident Response - 5 Keys to Successful Defense at S...
ODP
DansGuardian open source content filtering
Managing secrets at scale
Vault 1.1: Secret Caching with Vault Agent and Other New Features
My Bro The ELK
Red Team vs Blue Team on AWS - RSA 2018
lightning talk proposal
Modern Exploitation: Owning All of the Things
Vault - Secret and Key Management
Vulnerability intelligence with vulners.com / Кирилл Ермаков, Игорь Булатенко...
Putting Rugged Into your DevOps Toolchain
Extending Zeek for ICS Defense
Chickens & Eggs: Managing secrets in AWS with Hashicorp Vault
Death of WAF - GoSec '15
Death of Web App Firewall
I hunt sys admins 2.0
Keeping a Secret with HashiCorp Vault
HTTP For the Good or the Bad
ContainerDays Boston 2016: "Hiding in Plain Sight: Managing Secrets in a Cont...
ModSecurity and NGINX: Tuning the OWASP Core Rule Set - EMEA (Updated)
BlueHat v17 || Scaling Incident Response - 5 Keys to Successful Defense at S...
DansGuardian open source content filtering
Ad

Viewers also liked (17)

PDF
Rugged by example with Gauntlt (Hacker Headshot)
PDF
Epistemological Problem of Application Security
PDF
Adversity: Good for software
PDF
Frekans ölçer
PPT
Wikispace
PDF
Gabarito 2º simuladão 2011 dom bosco
PDF
2012 Pink Report Order Form
PDF
Düşük güçlü jeneratör
PDF
Michael Schneider Biography
DOCX
Parcial nuevas tecnologias
PDF
Elektronik Termometre
PPSX
Programa de alumnos ayudantes del ies azucarera
PDF
Graph
DOCX
Los mapas mentales y conceptuales reseña.
DOCX
DOCX
Rugged by example with Gauntlt (Hacker Headshot)
Epistemological Problem of Application Security
Adversity: Good for software
Frekans ölçer
Wikispace
Gabarito 2º simuladão 2011 dom bosco
2012 Pink Report Order Form
Düşük güçlü jeneratör
Michael Schneider Biography
Parcial nuevas tecnologias
Elektronik Termometre
Programa de alumnos ayudantes del ies azucarera
Graph
Los mapas mentales y conceptuales reseña.
Ad

Similar to Be Mean to Your Code - DevOps Days Austin 2013 (20)

PDF
Be Mean to Your Code - OWASP San Antonio
PDF
Be Mean to your Code with Gauntlt #txlf 2013
PDF
Brining Harmony between Dev and Ops and Security Teams using Gauntlt at ISC2 ...
PDF
Gauntlt Rugged By Example
PDF
Rugged Driven Development with Gauntlt
PDF
Gauntlt: Go Ahead, Be Mean to your Code
PDF
Gauntlt Rugged By Example
PDF
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
PDF
Security testing with gauntlt
PPTX
N map presentation
PPTX
DC612 Day - Hands on Penetration Testing 101
PPTX
Understanding Open Ports: Functions, Benefits, and Threats
PDF
CSEC 610 Individual Assignment Essay
PPTX
PDF
PDF
Ch 5: Port Scanning
PPTX
Analyzing Open Ports on Websites: Functions, Benefits, Threats, and Detailed ...
PPTX
Null Delhi chapter - Feb 2019
PPTX
Recon with Nmap
PPTX
G3t R00t at IUT
Be Mean to Your Code - OWASP San Antonio
Be Mean to your Code with Gauntlt #txlf 2013
Brining Harmony between Dev and Ops and Security Teams using Gauntlt at ISC2 ...
Gauntlt Rugged By Example
Rugged Driven Development with Gauntlt
Gauntlt: Go Ahead, Be Mean to your Code
Gauntlt Rugged By Example
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
Security testing with gauntlt
N map presentation
DC612 Day - Hands on Penetration Testing 101
Understanding Open Ports: Functions, Benefits, and Threats
CSEC 610 Individual Assignment Essay
Ch 5: Port Scanning
Analyzing Open Ports on Websites: Functions, Benefits, Threats, and Detailed ...
Null Delhi chapter - Feb 2019
Recon with Nmap
G3t R00t at IUT

More from James Wickett (20)

PDF
A Pragmatic Union: Security and SRE
PDF
A Way to Think about DevSecOps: MEASURE
PDF
The Security, DevOps, and Chaos Playbook to Change the World
PDF
Pragmatic Pipeline Security
PDF
A Tale of Woe, Chaos, and Business
PDF
A DevSecOps Tale of Business, Engineering, and People
PDF
The New Ways of DevSecOps - The Secure Dev 2019
PDF
NewOps Days 2019: The New Ways of Chaos, Security, and DevOps
PDF
The New Ways of Chaos, Security, and DevOps
PDF
DevOpsDays Austin: Security in the FaaS Lane
PDF
The Seven Habits of the Highly Effective DevSecOp
PDF
Serverless Security: A How-to Guide @ SnowFROC 2019
PDF
Release Your Inner DevSecOp
PDF
Security in the FaaS Lane
PDF
The New Security Playbook: DevSecOps
PDF
The Emergent Cloud Security Toolchain for CI/CD
PDF
Adversary Driven Defense in the Real World
PDF
The DevSecOps Builder’s Guide to the CI/CD Pipeline
PDF
DevSecOps and the CI/CD Pipeline
PDF
The State of DevSecOps in 2018
A Pragmatic Union: Security and SRE
A Way to Think about DevSecOps: MEASURE
The Security, DevOps, and Chaos Playbook to Change the World
Pragmatic Pipeline Security
A Tale of Woe, Chaos, and Business
A DevSecOps Tale of Business, Engineering, and People
The New Ways of DevSecOps - The Secure Dev 2019
NewOps Days 2019: The New Ways of Chaos, Security, and DevOps
The New Ways of Chaos, Security, and DevOps
DevOpsDays Austin: Security in the FaaS Lane
The Seven Habits of the Highly Effective DevSecOp
Serverless Security: A How-to Guide @ SnowFROC 2019
Release Your Inner DevSecOp
Security in the FaaS Lane
The New Security Playbook: DevSecOps
The Emergent Cloud Security Toolchain for CI/CD
Adversary Driven Defense in the Real World
The DevSecOps Builder’s Guide to the CI/CD Pipeline
DevSecOps and the CI/CD Pipeline
The State of DevSecOps in 2018

Recently uploaded (20)

PDF
KodekX | Application Modernization Development
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPT
Teaching material agriculture food technology
PPTX
Big Data Technologies - Introduction.pptx
PDF
Encapsulation theory and applications.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Spectroscopy.pptx food analysis technology
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
KodekX | Application Modernization Development
Digital-Transformation-Roadmap-for-Companies.pptx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
NewMind AI Weekly Chronicles - August'25 Week I
Dropbox Q2 2025 Financial Results & Investor Presentation
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Review of recent advances in non-invasive hemoglobin estimation
MYSQL Presentation for SQL database connectivity
Programs and apps: productivity, graphics, security and other tools
Per capita expenditure prediction using model stacking based on satellite ima...
Advanced methodologies resolving dimensionality complications for autism neur...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Teaching material agriculture food technology
Big Data Technologies - Introduction.pptx
Encapsulation theory and applications.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Spectroscopy.pptx food analysis technology
How UI/UX Design Impacts User Retention in Mobile Apps.pdf

Be Mean to Your Code - DevOps Days Austin 2013

  • 1. Be Mean toYour Code with Gauntlt
  • 4. “[RISK ASSESSMENT] INTRODUCES A DANGEROUS FALLACY:THAT STRUCTURED INADEQUACY IS ALMOST AS GOOD AS ADEQUACY AND THAT UNDERFUNDED SECURITY EFFORTS PLUS RISK MANAGEMENT ARE ABOUT AS GOOD AS PROPERLY FUNDED SECURITY WORK” - MICHAL ZALEWSKI
  • 5. “Is this Secure?” -Your Customer “It’s Certified” -You
  • 8. security tools are confusing
  • 9. Gauntlt allows dev and ops and security to communicate
  • 10. $ gem install gauntlt install gauntlt
  • 11. Feature: nmap attacks for example.com Background: Given "nmap" is installed And the following profile: | name | value | | hostname | example.com | | tcp_ping_ports | 22,25,80,443 | Scenario: Verify server is open on expected ports When I launch an "nmap" attack with: """ nmap -F <hostname> """ Then the output should contain: """ 80/tcp open https """ Scenario: Verify that there are no unexpected ports open When I launch an "nmap" attack with: """ nmap -F <hostname> """ Then the output should not contain: """ 25/tcp """ Given When Then When Then
  • 12. $ gauntlt Feature: nmap attacks for example.com Background: Given "nmap" is installed And the following profile: | name | value | | hostname | example.com | | tcp_ping_ports | 22,25,80,443 | Scenario: Verify server is open on expected ports When I launch an "nmap" attack with: """ nmap -F www.example.com """ Then the output should contain: """ 443/tcp open https """ 1 scenario (1 failed) 5 steps (1 failed, 4 passed) 0m18.341s running gauntlt with failing tests
  • 13. $ gauntlt Feature: nmap attacks for example.com Background: Given "nmap" is installed And the following profile: | name | value | | hostname | example.com | | tcp_ping_ports | 22,25,80,443 | Scenario: Verify server is open on expected ports When I launch an "nmap" attack with: """ nmap -F www.example.com """ Then the output should contain: """ 443/tcp open https """ 1 scenario (1 passed) 5 steps (5 passed) 0m18.341s running gauntlt with passing tests
  • 14. Feature: nmap attacks for example.com Background: Given "nmap" is installed And the following profile: | name | value | | hostname | example.com | | tcp_ping_ports | 22,25,80,443 | Scenario: Verify server is open on expected ports When I launch an "nmap" attack with: """ nmap -F <hostname> """ Then the output should contain: """ 80/tcp open https """ Scenario: Verify that there are no unexpected ports open When I launch an "nmap" attack with: """ nmap -F <hostname> """ Then the output should not contain: """ 25/tcp """ setup steps verify tool set config
  • 15. Feature: nmap attacks for example.com Background: Given "nmap" is installed And the following profile: | name | value | | hostname | example.com | | tcp_ping_ports | 22,25,80,443 | Scenario: Verify server is open on expected ports When I launch an "nmap" attack with: """ nmap -F <hostname> """ Then the output should contain: """ 80/tcp open https """ Scenario: Verify that there are no unexpected ports open When I launch an "nmap" attack with: """ nmap -F <hostname> """ Then the output should not contain: """ 25/tcp """ attack get config
  • 16. Feature: nmap attacks for example.com Background: Given "nmap" is installed And the following profile: | name | value | | hostname | example.com | | tcp_ping_ports | 22,25,80,443 | Scenario: Verify server is open on expected ports When I launch an "nmap" attack with: """ nmap -F <hostname> """ Then the output should contain: """ 80/tcp open https """ Scenario: Verify that there are no unexpected ports open When I launch an "nmap" attack with: """ nmap -F <hostname> """ Then the output should not contain: """ 25/tcp """ assert needle haystack
  • 18. get started with gauntlt github/gauntlt gauntlt.org videos tutorials @gauntlt IRC #gauntlt we help! start here cool vids!
  • 19. be mean to your code and win! slideshare.com/wickett