SlideShare a Scribd company logo
P R E S E N T A T I O N B Y P 3 T 3 R P 4 R K 3 R
Introduction
Security Automation
Python
Working as a Security Engineer
Hello!
I Am Santhosh Baswa
You can contact me at Twitter@P3t3rP4rk4r
Think Innovative
Automation
1
Automation
Innovative & Improve processes using Multiple Integrations.
Automation is taking action without human intervention.
Scope of Industrialisation.
It is the automatic handling of a task in machine-based
security application that would otherwise be done manually
by a cyber security professional.
Security Automation
Security
Automation
Security Operations
(Blue Team)
Adversary
Simulation & PT
(Red Team)
Application
SecurityDevSecOps
Compliance
SOC Operations
(Blue Team)
Alert Triage & IR
- Integration SIEM - (Log sources)
- Correlation Rules & Central Alert System
- IR - Team Coordination (Timeline Track)
Phishing Triage
- Phishing email Analysis.
- Extraction IPs & URLs & Attachments.
- Integrate & Check those IOCs (F/T)
- Automated Email notifications.
APIs + Digital
Forensic
Investigations
- Automated Remote Forensic Imaging
- Automated Volatility Investigation Report
- Innovative Projects (CTI Integrations etc)
Threat Intelligence
- Integrate Dark Web Intelligence Tools
- Track APT + New Malware IOCs
- Password Dumps & Email Compromise
- Automated Threat Lookups & SIEM
Adversary Simulation (Red Team)
&
Penetration Testing
RT / Pentest Environment
- Automated Phishing Campaigns (PhishFrenzy).
- Covert C2 Channels & Beacon Infra (Cobalt Strike)
- Client Sensitive Data Sync/Secure Backup.
Recon
- OSINT (Web Crawling)
- Campaign Email Generation
- Sensitive Data Collection (Ex:Gitrob)
Scan/Enumeration
- Controlled NMAP Scans (NSE)
- Sub Directories/Domains ReportsExploitation
- Modification of Toolset
- Payload Generation
- AV Bypass payload Test Post Exploitation
- Data Exfiltration Automation
- Slack/Gmail/Twitter/C2
01
02
03
05
04
Bugs/Fixes
- Vulnerable Versions & Packages.
- Security Bug fixes (Bug Bounty)
Testing/Verification
- Automated DAST Program.
Code/Implementation
- Secure Coding Standards.
- Static Code Test Automation
Requirements & Design
- Choose Dependencies / Languages
- Secure Application Design
Training
- Training program for new joiners /
experience developers.
- Test their abilities through Quiz.
Application Security -Automation
DevSecOps
Cloud Infrastructure
- Security Monitoring (CloudTrail)
- Automated Profile based Security Checks
Automated Security Tests
- Security Functional Tests (Auth checks)
- Default Configs (Apache security config checks)
Code Analysis
- Static Code Analysis (Vulnerable Functions)
Runtime Application Security
- Fuzzing/Dynamic checks on Validation.
- Automated API input checks.
Detect & Respond
- Automated Incident Scoring
- Tracking Incidents
Protect
- Security Controls Check (NIST)
- Track process & Procedures
Inventory
- External Asset Inventory
- Automated Risk Level
Categorisation
Recovery
- Syslog Backups
- Downtime
- Crisis management
Compliance -Automation
Python Automation
Ideas
Python Automation
Sys/NetworkOps (OS Internals/Command Execution/SSH/SMTP/SNMP)
Web modules (OSINT/WebApp Testing/Auth/Injections/Brute force)
Cryptography (Hash/Encrypt/Decrypt)
Network/Digital Forensics (Steganography/PCAP Analysis/Image Acquisition)
“Practical Session
You can find me at:
git@P3t3rp4rk3r
Google:”Santhosh Baswa”
Any questions?
Thanks!

More Related Content

PPTX
Python presentation by Monu Sharma
PDF
Honeypots for Active Defense
PDF
Introduction to Deep Learning, Keras, and TensorFlow
PPT
Python Built-in Functions and Use cases
PDF
딥러닝의 기본
PDF
Generative AI Models & Their Applications
 
PDF
Installing Anaconda Distribution of Python
PPTX
[Paper Reading] Attention is All You Need
Python presentation by Monu Sharma
Honeypots for Active Defense
Introduction to Deep Learning, Keras, and TensorFlow
Python Built-in Functions and Use cases
딥러닝의 기본
Generative AI Models & Their Applications
 
Installing Anaconda Distribution of Python
[Paper Reading] Attention is All You Need

What's hot (20)

PDF
1시간만에 GAN(Generative Adversarial Network) 완전 정복하기
PDF
Introduction to Python IDLE | IDLE Tutorial | Edureka
PPTX
POWER OF PYTHON PROGRAMMING LANGUAGE
PPTX
Convolution Neural Network (CNN)
PDF
PyTorch Python Tutorial | Deep Learning Using PyTorch | Image Classifier Usin...
PDF
stackconf 2022: Introduction to Vector Search with Weaviate
PDF
The Validity of CNN to Time-Series Forecasting Problem
ODP
Data Analysis in Python
PDF
TensorFlow Object Detection | Realtime Object Detection with TensorFlow | Ten...
PDF
Prompt Engineering
PPTX
Tensorflow Ecosystem
PPTX
A Comprehensive Review of Large Language Models for.pptx
PPTX
Deep Learning With Python | Deep Learning And Neural Networks | Deep Learning...
PDF
Python libraries
PDF
AI Prompt Engineering 101.pdf
PDF
한국어 문서 추출요약 AI 경진대회- 좌충우돌 후기
PDF
Introduction to TensorFlow 2.0
PPTX
FUNCTIONS IN PYTHON[RANDOM FUNCTION]
PDF
Layout lm paper review
PPTX
Python | What is Python | History of Python | Python Tutorial
1시간만에 GAN(Generative Adversarial Network) 완전 정복하기
Introduction to Python IDLE | IDLE Tutorial | Edureka
POWER OF PYTHON PROGRAMMING LANGUAGE
Convolution Neural Network (CNN)
PyTorch Python Tutorial | Deep Learning Using PyTorch | Image Classifier Usin...
stackconf 2022: Introduction to Vector Search with Weaviate
The Validity of CNN to Time-Series Forecasting Problem
Data Analysis in Python
TensorFlow Object Detection | Realtime Object Detection with TensorFlow | Ten...
Prompt Engineering
Tensorflow Ecosystem
A Comprehensive Review of Large Language Models for.pptx
Deep Learning With Python | Deep Learning And Neural Networks | Deep Learning...
Python libraries
AI Prompt Engineering 101.pdf
한국어 문서 추출요약 AI 경진대회- 좌충우돌 후기
Introduction to TensorFlow 2.0
FUNCTIONS IN PYTHON[RANDOM FUNCTION]
Layout lm paper review
Python | What is Python | History of Python | Python Tutorial
Ad

Similar to Security Automation - Python - Introduction (20)

PPTX
Sumo Logic Cert Jam - Security Analytics
PPTX
Practical Security Assessments of IoT Devices and Systems
PDF
Security Certification: Security Analytics using Sumo Logic - Oct 2018
PDF
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
PDF
Automated prevention of ransomware with machine learning and gpos
PDF
Slide Griffin - Practical Attacks and Mitigations
PDF
technical-information-gathering-slides.pdf
PDF
Big Data Security Analytic Solution using Splunk
PDF
Axxera Security Solutions
PDF
RIoT (Raiding Internet of Things) by Jacob Holcomb
PDF
Application Programming Interface
PPTX
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
PDF
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
PPTX
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
PDF
INTERFACE by apidays 2023 - Security Exposure Management in API First World, ...
PDF
ScaleOut your team - Building a technology team for scale in a DevOps culture
PDF
MMIX Peering Forum and MMNOG 2020: Packet Analysis for Network Security
PPTX
2022 APIsecure_Method for exploiting IDOR on nodejs+mongodb based backend
PPTX
[CONFidence 2016] Jacek Grymuza - From a life of SOC Analyst
PDF
Getting Started with Splunk Enterprise
Sumo Logic Cert Jam - Security Analytics
Practical Security Assessments of IoT Devices and Systems
Security Certification: Security Analytics using Sumo Logic - Oct 2018
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
Automated prevention of ransomware with machine learning and gpos
Slide Griffin - Practical Attacks and Mitigations
technical-information-gathering-slides.pdf
Big Data Security Analytic Solution using Splunk
Axxera Security Solutions
RIoT (Raiding Internet of Things) by Jacob Holcomb
Application Programming Interface
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
INTERFACE by apidays 2023 - Security Exposure Management in API First World, ...
ScaleOut your team - Building a technology team for scale in a DevOps culture
MMIX Peering Forum and MMNOG 2020: Packet Analysis for Network Security
2022 APIsecure_Method for exploiting IDOR on nodejs+mongodb based backend
[CONFidence 2016] Jacek Grymuza - From a life of SOC Analyst
Getting Started with Splunk Enterprise
Ad

Recently uploaded (20)

PPTX
Cloud computing and distributed systems.
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Encapsulation theory and applications.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPT
Teaching material agriculture food technology
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Electronic commerce courselecture one. Pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
sap open course for s4hana steps from ECC to s4
Cloud computing and distributed systems.
Digital-Transformation-Roadmap-for-Companies.pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Encapsulation theory and applications.pdf
MYSQL Presentation for SQL database connectivity
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Advanced methodologies resolving dimensionality complications for autism neur...
Teaching material agriculture food technology
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Empathic Computing: Creating Shared Understanding
Electronic commerce courselecture one. Pdf
NewMind AI Weekly Chronicles - August'25-Week II
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
sap open course for s4hana steps from ECC to s4

Security Automation - Python - Introduction

  • 1. P R E S E N T A T I O N B Y P 3 T 3 R P 4 R K 3 R Introduction Security Automation Python
  • 2. Working as a Security Engineer Hello! I Am Santhosh Baswa You can contact me at Twitter@P3t3rP4rk4r
  • 4. Automation Innovative & Improve processes using Multiple Integrations. Automation is taking action without human intervention. Scope of Industrialisation.
  • 5. It is the automatic handling of a task in machine-based security application that would otherwise be done manually by a cyber security professional. Security Automation
  • 6. Security Automation Security Operations (Blue Team) Adversary Simulation & PT (Red Team) Application SecurityDevSecOps Compliance
  • 7. SOC Operations (Blue Team) Alert Triage & IR - Integration SIEM - (Log sources) - Correlation Rules & Central Alert System - IR - Team Coordination (Timeline Track) Phishing Triage - Phishing email Analysis. - Extraction IPs & URLs & Attachments. - Integrate & Check those IOCs (F/T) - Automated Email notifications. APIs + Digital Forensic Investigations - Automated Remote Forensic Imaging - Automated Volatility Investigation Report - Innovative Projects (CTI Integrations etc) Threat Intelligence - Integrate Dark Web Intelligence Tools - Track APT + New Malware IOCs - Password Dumps & Email Compromise - Automated Threat Lookups & SIEM
  • 8. Adversary Simulation (Red Team) & Penetration Testing RT / Pentest Environment - Automated Phishing Campaigns (PhishFrenzy). - Covert C2 Channels & Beacon Infra (Cobalt Strike) - Client Sensitive Data Sync/Secure Backup. Recon - OSINT (Web Crawling) - Campaign Email Generation - Sensitive Data Collection (Ex:Gitrob) Scan/Enumeration - Controlled NMAP Scans (NSE) - Sub Directories/Domains ReportsExploitation - Modification of Toolset - Payload Generation - AV Bypass payload Test Post Exploitation - Data Exfiltration Automation - Slack/Gmail/Twitter/C2
  • 9. 01 02 03 05 04 Bugs/Fixes - Vulnerable Versions & Packages. - Security Bug fixes (Bug Bounty) Testing/Verification - Automated DAST Program. Code/Implementation - Secure Coding Standards. - Static Code Test Automation Requirements & Design - Choose Dependencies / Languages - Secure Application Design Training - Training program for new joiners / experience developers. - Test their abilities through Quiz. Application Security -Automation
  • 10. DevSecOps Cloud Infrastructure - Security Monitoring (CloudTrail) - Automated Profile based Security Checks Automated Security Tests - Security Functional Tests (Auth checks) - Default Configs (Apache security config checks) Code Analysis - Static Code Analysis (Vulnerable Functions) Runtime Application Security - Fuzzing/Dynamic checks on Validation. - Automated API input checks.
  • 11. Detect & Respond - Automated Incident Scoring - Tracking Incidents Protect - Security Controls Check (NIST) - Track process & Procedures Inventory - External Asset Inventory - Automated Risk Level Categorisation Recovery - Syslog Backups - Downtime - Crisis management Compliance -Automation
  • 13. Python Automation Sys/NetworkOps (OS Internals/Command Execution/SSH/SMTP/SNMP) Web modules (OSINT/WebApp Testing/Auth/Injections/Brute force) Cryptography (Hash/Encrypt/Decrypt) Network/Digital Forensics (Steganography/PCAP Analysis/Image Acquisition)
  • 15. You can find me at: git@P3t3rp4rk3r Google:”Santhosh Baswa” Any questions? Thanks!