SlideShare a Scribd company logo
Dark Insight
the basics of security
by Alexander Obozinsky
We are talking about
Things like
• BIND TSIG CVE-2017-3143
• Intel AMT CVE-2017-5689
• Doorkeeper CVE-2016-6582
• Google groups for business default settings
• Source engine
• Ovidiy Stealer
• Kerberos CVE-2017-11368
• sudo CVE-2017-1000367
• Skype CVE-2017-6517
• RubyGems CVE-2017-0901
Informational
Security
Confidentiality
Integrity Availability
Cyber Security
Is about threats for

• Hardware

• Software

• Network

• Data
Hardware Threats
• Physical

• Not only about servers

• Not only about computers

• Hidden hardware in your
computers

• Closed-source firmware

• Virtualization

• Escaping from guest OS

• Clouds
Software Threats
• OS security

• Vulnerabilities in libraries

• Vulnerabilities in server software

• 3rd party software can have unexpected side effects

• Open source software can be compromised

• Insecurity in security software
Network Threats
• Passive

• Monitoring

• Eavesdropping

• Active

• Tampering

• DoS

• Buffer Overflow

• DNS poisoning

• XSS/CSRF/SSRF/SQLi

• Networking devices

• IoT devices
Data Threats
• Can be violated by 3rd persons

• Data integrity can be broken by hardware/software
failures

• Fake data can be used as primary source of truth

• Small leak can compromise whole system
Social Engineering
Hack by using human psychology vulnerabilities

• Giving people what they want

• Provoking by content

• Road Apple Attack

• Phishing

• Using information from social networks

• Reverse SE
Insiders
• You can buy insider info

• Insider can be hired by you

• Someone can compromise your normal employee

• Life circumstances can turn your employees against you

• Firing process
Securing
Your Systems
Hardware
• Personal

• Enterprise Workstations

• Servers
Operating Systems
• Linux distributions

• OpenBSD

• Windows

• Virtual Environments

• Containers

• Cloud VPS
Software
• Design safe systems

• Agile vs Security

• Security checks

• Monitoring

• Code inspection and review

• Automated security scanning

• OWASP Software Assurance Maturity Model
Network
• Corporate network

• Wifi routers

• Guest networks

• Mobile Phones

• DNS Sec

• DMZ

• Firewalls

• WAF

• Intrusion Prevention

• Honeypots

• Intrusion Detection

• Simple Models

• Port Knocking

• Remote access to your servers through VPN
Data
• Integrity

• Persistence

• Access Restriction

• Confidentiality
Cryptography
• Ciphers

• Asymmetric

• RSA/DSA/DH

• Symmetric

• Block

• DES/3DES

• Blowfish/AES

• Cipher Block Chaining (CBC)

• Stream

• RC4/ARCFOUR

• Salsa20/ChaCha20

• Hash functions

• MD5

• SHA
Web Applications Security
• SSL/TLS

• HTTPS / HTTP2

• letsencrypt.org

• Web Application Firewalls

• Local

• Cloud

• AWS/Cloudflare/Akamai

• Black box testing

• Fuzz testing

• White box testing
Software
Tenable Nessus/Pentestit OpenVAS
security scanners
• 82k/50k plugins 

• CVE and OpenSCAP databases linked

• Nessus (dockerhub pull 100k+)

• OpenVAS (dockerhub pull 1m+)

• http://www.openvas.org/

• https://www.tenable.com/products/nessus-vulnerability-
scanner
w3af OSS web applications
audit framework
• Contains

• Crawl plugins

• Audit plugins

• Attack plugins

• http://w3af.org/
OWASP Zed Attack Proxy
Project
• Opensource

• Dynamically developing

• Easy to use

• No paid version

• https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project
nikto
• Checks for outdated components

• Scan multiple ports on a server, or multiple servers via
input file

• Identifies installed software via headers, favicons and files

• Subdomain guessing

• Can log to Metasploit

• https://cirt.net/Nikto2
• Scanner for RoR applications

• https://brakemanscanner.org/
Radamsa
• Open source fuzz testing framework

• https://github.com/aoh/radamsa
OSS WAF
• NAXSI https://github.com/nbs-system/naxsi

• ModSecurity https://modsecurity.org/

• TestCookie https://github.com/kyprizel/testcookie-nginx-
module
• Ruby framework

• Golden Standard in Industry

• https://www.offensive-security.com/metasploit-unleashed/
It’s time
Where to learn?
• https://www.hacksplaining.com/

• http://www.cvedetails.com/

• https://www.owasp.org/

• http://www.opennet.ru/

• https://thehackernews.com/

• http://krebsonsecurity.com/

• https://github.com/onlurking/awesome-infosec
qu35710n5?
https://gitlab.com/l33t/ahoregator
rm@nmc.ninja

More Related Content

PPTX
Web & Cloud Security in the real world
PDF
Common crypto attacks and secure implementations
PDF
Zerotrusting serverless applications protecting microservices using secure d...
PDF
Node JS reverse shell
PDF
Modern Security Operations aka Secure DevOps @ All Day DevOps 2017
PDF
Bsides angler-evolution talk
Web & Cloud Security in the real world
Common crypto attacks and secure implementations
Zerotrusting serverless applications protecting microservices using secure d...
Node JS reverse shell
Modern Security Operations aka Secure DevOps @ All Day DevOps 2017
Bsides angler-evolution talk

What's hot (20)

PPTX
Hacking Exposé - Using SSL to Secure SQL Server Connections
PPTX
Matriux blue
PPTX
State of the Web
PPTX
Spa Secure Coding Guide
PDF
Introduction to Mod security session April 2016
PDF
Optimizing ModSecurity on NGINX and NGINX Plus
PDF
Implementing ossec
PPTX
Mod security
PDF
Fidelis - Live Demonstration of Deception Solution
PDF
Top 10 Threats to Cloud Security
PDF
20 common security vulnerabilities and misconfiguration in Azure
PDF
Mod Security
PDF
Dangerous Design Patterns In One Line
PPTX
Equifax cyber attack contained by containers
PDF
All You Need is One - A ClickOnce Love Story - Secure360 2015
PPTX
Web Application Security - DevFest + GDay George Town 2016
PPTX
The Rise of Secrets Management
PDF
Attacker's Perspective of Active Directory
PPTX
Towards Securing Computer Network Environment By Using Kerberos-based Network...
PDF
Ossec Lightning
Hacking Exposé - Using SSL to Secure SQL Server Connections
Matriux blue
State of the Web
Spa Secure Coding Guide
Introduction to Mod security session April 2016
Optimizing ModSecurity on NGINX and NGINX Plus
Implementing ossec
Mod security
Fidelis - Live Demonstration of Deception Solution
Top 10 Threats to Cloud Security
20 common security vulnerabilities and misconfiguration in Azure
Mod Security
Dangerous Design Patterns In One Line
Equifax cyber attack contained by containers
All You Need is One - A ClickOnce Love Story - Secure360 2015
Web Application Security - DevFest + GDay George Town 2016
The Rise of Secrets Management
Attacker's Perspective of Active Directory
Towards Securing Computer Network Environment By Using Kerberos-based Network...
Ossec Lightning
Ad

Similar to Dark Insight: the Basic of Security - Alexander Obozinskiy (20)

DOCX
FBI & Secret Service- Business Email Compromise Workshop
PDF
CompTIA-Security-Study-Guide-with-over-500-Practice-Test-Questions-Exam-SY0-7...
PDF
RIoT (Raiding Internet of Things) by Jacob Holcomb
DOCX
FBI & Secret Service- Business Email Compromise Workshop
PPT
CyberCrime in the Cloud and How to defend Yourself
PPTX
Blue Teaming on a Budget of Zero
PPTX
Open Source Defense for Edge 2017
PPTX
Security on AWS
PPTX
Penetration testing dont just leave it to chance
PDF
Web App Security Presentation by Ryan Holland - 05-31-2017
PPTX
Cloud Security vs Security in the Cloud
PDF
Vulnerability Assessment Report
PDF
Invited Talk - Cyber Security and Open Source
PPTX
Cloud computing security
PPT
Cloud Computing & Security
PDF
NSA and PT
PPTX
Ending the Tyranny of Expensive Security Tools
PPTX
Ending the Tyranny of Expensive Security Tools
PDF
Information Security Risk Management
PDF
Construye tu stack de ciberseguridad con open source
FBI & Secret Service- Business Email Compromise Workshop
CompTIA-Security-Study-Guide-with-over-500-Practice-Test-Questions-Exam-SY0-7...
RIoT (Raiding Internet of Things) by Jacob Holcomb
FBI & Secret Service- Business Email Compromise Workshop
CyberCrime in the Cloud and How to defend Yourself
Blue Teaming on a Budget of Zero
Open Source Defense for Edge 2017
Security on AWS
Penetration testing dont just leave it to chance
Web App Security Presentation by Ryan Holland - 05-31-2017
Cloud Security vs Security in the Cloud
Vulnerability Assessment Report
Invited Talk - Cyber Security and Open Source
Cloud computing security
Cloud Computing & Security
NSA and PT
Ending the Tyranny of Expensive Security Tools
Ending the Tyranny of Expensive Security Tools
Information Security Risk Management
Construye tu stack de ciberseguridad con open source
Ad

More from Ruby Meditation (20)

PDF
Is this Legacy or Revenant Code? - Sergey Sergyenko | Ruby Meditation 30
PDF
Life with GraphQL API: good practices and unresolved issues - Roman Dubrovsky...
PDF
Where is your license, dude? - Viacheslav Miroshnychenko | Ruby Meditation 29
PDF
Dry-validation update. Dry-validation vs Dry-schema 1.0 - Aleksandra Stolyar ...
PDF
How to cook Rabbit on Production - Bohdan Parshentsev | Ruby Meditation 28
PDF
How to cook Rabbit on Production - Serhiy Nazarov | Ruby Meditation 28
PDF
Reinventing the wheel - why do it and how to feel good about it - Julik Tarkh...
PDF
Performance Optimization 101 for Ruby developers - Nihad Abbasov (ENG) | Ruby...
PDF
Use cases for Serverless Technologies - Ruslan Tolstov (RUS) | Ruby Meditatio...
PDF
The Trailblazer Ride from the If Jungle into a Civilised Railway Station - Or...
PDF
What/How to do with GraphQL? - Valentyn Ostakh (ENG) | Ruby Meditation 27
PDF
New features in Rails 6 - Nihad Abbasov (RUS) | Ruby Meditation 26
PDF
Security Scanning Overview - Tetiana Chupryna (RUS) | Ruby Meditation 26
PDF
Teach your application eloquence. Logs, metrics, traces - Dmytro Shapovalov (...
PDF
Best practices. Exploring - Ike Kurghinyan (RUS) | Ruby Meditation 26
PDF
Road to A/B testing - Alexey Vasiliev (ENG) | Ruby Meditation 25
PDF
Concurrency in production. Real life example - Dmytro Herasymuk | Ruby Medita...
PDF
Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...
PDF
Rails App performance at the limit - Bogdan Gusiev
PDF
GDPR. Next Y2K in 2018? - Anton Tkachov | Ruby Meditation #23
Is this Legacy or Revenant Code? - Sergey Sergyenko | Ruby Meditation 30
Life with GraphQL API: good practices and unresolved issues - Roman Dubrovsky...
Where is your license, dude? - Viacheslav Miroshnychenko | Ruby Meditation 29
Dry-validation update. Dry-validation vs Dry-schema 1.0 - Aleksandra Stolyar ...
How to cook Rabbit on Production - Bohdan Parshentsev | Ruby Meditation 28
How to cook Rabbit on Production - Serhiy Nazarov | Ruby Meditation 28
Reinventing the wheel - why do it and how to feel good about it - Julik Tarkh...
Performance Optimization 101 for Ruby developers - Nihad Abbasov (ENG) | Ruby...
Use cases for Serverless Technologies - Ruslan Tolstov (RUS) | Ruby Meditatio...
The Trailblazer Ride from the If Jungle into a Civilised Railway Station - Or...
What/How to do with GraphQL? - Valentyn Ostakh (ENG) | Ruby Meditation 27
New features in Rails 6 - Nihad Abbasov (RUS) | Ruby Meditation 26
Security Scanning Overview - Tetiana Chupryna (RUS) | Ruby Meditation 26
Teach your application eloquence. Logs, metrics, traces - Dmytro Shapovalov (...
Best practices. Exploring - Ike Kurghinyan (RUS) | Ruby Meditation 26
Road to A/B testing - Alexey Vasiliev (ENG) | Ruby Meditation 25
Concurrency in production. Real life example - Dmytro Herasymuk | Ruby Medita...
Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...
Rails App performance at the limit - Bogdan Gusiev
GDPR. Next Y2K in 2018? - Anton Tkachov | Ruby Meditation #23

Recently uploaded (20)

PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Modernizing your data center with Dell and AMD
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Machine learning based COVID-19 study performance prediction
PDF
Approach and Philosophy of On baking technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Mobile App Security Testing_ A Comprehensive Guide.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Network Security Unit 5.pdf for BCA BBA.
Diabetes mellitus diagnosis method based random forest with bat algorithm
Spectral efficient network and resource selection model in 5G networks
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
NewMind AI Monthly Chronicles - July 2025
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Chapter 3 Spatial Domain Image Processing.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
The AUB Centre for AI in Media Proposal.docx
Modernizing your data center with Dell and AMD
20250228 LYD VKU AI Blended-Learning.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Machine learning based COVID-19 study performance prediction
Approach and Philosophy of On baking technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...

Dark Insight: the Basic of Security - Alexander Obozinskiy

  • 1. Dark Insight the basics of security by Alexander Obozinsky
  • 2. We are talking about Things like • BIND TSIG CVE-2017-3143 • Intel AMT CVE-2017-5689 • Doorkeeper CVE-2016-6582 • Google groups for business default settings • Source engine • Ovidiy Stealer • Kerberos CVE-2017-11368 • sudo CVE-2017-1000367 • Skype CVE-2017-6517 • RubyGems CVE-2017-0901
  • 4. Cyber Security Is about threats for • Hardware • Software • Network • Data
  • 5. Hardware Threats • Physical • Not only about servers • Not only about computers • Hidden hardware in your computers • Closed-source firmware • Virtualization • Escaping from guest OS • Clouds
  • 6. Software Threats • OS security • Vulnerabilities in libraries • Vulnerabilities in server software • 3rd party software can have unexpected side effects • Open source software can be compromised • Insecurity in security software
  • 7. Network Threats • Passive • Monitoring • Eavesdropping • Active • Tampering • DoS • Buffer Overflow • DNS poisoning • XSS/CSRF/SSRF/SQLi • Networking devices • IoT devices
  • 8. Data Threats • Can be violated by 3rd persons • Data integrity can be broken by hardware/software failures • Fake data can be used as primary source of truth • Small leak can compromise whole system
  • 9. Social Engineering Hack by using human psychology vulnerabilities • Giving people what they want • Provoking by content • Road Apple Attack • Phishing • Using information from social networks • Reverse SE
  • 10. Insiders • You can buy insider info • Insider can be hired by you • Someone can compromise your normal employee • Life circumstances can turn your employees against you • Firing process
  • 12. Hardware • Personal • Enterprise Workstations • Servers
  • 13. Operating Systems • Linux distributions • OpenBSD • Windows • Virtual Environments • Containers • Cloud VPS
  • 14. Software • Design safe systems • Agile vs Security • Security checks • Monitoring • Code inspection and review • Automated security scanning • OWASP Software Assurance Maturity Model
  • 15. Network • Corporate network • Wifi routers • Guest networks • Mobile Phones • DNS Sec • DMZ • Firewalls • WAF • Intrusion Prevention • Honeypots • Intrusion Detection • Simple Models • Port Knocking • Remote access to your servers through VPN
  • 16. Data • Integrity • Persistence • Access Restriction • Confidentiality
  • 17. Cryptography • Ciphers • Asymmetric • RSA/DSA/DH • Symmetric • Block • DES/3DES • Blowfish/AES • Cipher Block Chaining (CBC) • Stream • RC4/ARCFOUR • Salsa20/ChaCha20 • Hash functions • MD5 • SHA
  • 18. Web Applications Security • SSL/TLS • HTTPS / HTTP2 • letsencrypt.org • Web Application Firewalls • Local • Cloud • AWS/Cloudflare/Akamai • Black box testing • Fuzz testing • White box testing
  • 20. Tenable Nessus/Pentestit OpenVAS security scanners • 82k/50k plugins • CVE and OpenSCAP databases linked • Nessus (dockerhub pull 100k+) • OpenVAS (dockerhub pull 1m+) • http://www.openvas.org/ • https://www.tenable.com/products/nessus-vulnerability- scanner
  • 21. w3af OSS web applications audit framework • Contains • Crawl plugins • Audit plugins • Attack plugins • http://w3af.org/
  • 22. OWASP Zed Attack Proxy Project • Opensource • Dynamically developing • Easy to use • No paid version • https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project
  • 23. nikto • Checks for outdated components • Scan multiple ports on a server, or multiple servers via input file • Identifies installed software via headers, favicons and files • Subdomain guessing • Can log to Metasploit • https://cirt.net/Nikto2
  • 24. • Scanner for RoR applications • https://brakemanscanner.org/
  • 25. Radamsa • Open source fuzz testing framework • https://github.com/aoh/radamsa
  • 26. OSS WAF • NAXSI https://github.com/nbs-system/naxsi • ModSecurity https://modsecurity.org/ • TestCookie https://github.com/kyprizel/testcookie-nginx- module
  • 27. • Ruby framework • Golden Standard in Industry • https://www.offensive-security.com/metasploit-unleashed/
  • 29. Where to learn? • https://www.hacksplaining.com/ • http://www.cvedetails.com/ • https://www.owasp.org/ • http://www.opennet.ru/ • https://thehackernews.com/ • http://krebsonsecurity.com/ • https://github.com/onlurking/awesome-infosec