The day began with the second keynote speaker for the week (Catarina Mota) who spoke on the topic "Life is better with Open Source". Good talk, but not as good as yesterday's. Her main emphasis was on open-sourced hardware.
3/1- Using Linux features to make a hacker's life hard by Kayne Naughton
Kayne's talk emphasised the increase of Advanced Persistent Threats (APT) which following a distinct pattern of infiltration:- Reconnaissance
- Weaponisation
- Delivery
- Exploitation
- Installation
- Command and Control
- Actions on Objectives
Successful APTs may continue for years if undetected. The six D's of mitigation are:
- Detect
- Deny
- Disrupt
- Degrade
- Deceive
- Destroy
Kayne discussed each of the steps in detail with examples.
3/2 - How To Write A Linux Security Module That Makes Sense For You by Casey Schaufler
The second security talk was highly specialised and targeted towards kernel module developers. Since I am unlikely to write a kernel module in the near future, this was more an information session for me. However I did learn the difference between major and minor security modules.
After lunch I dived into the first of two double-session workshops.
3/3 - Identity Management with FreeIPA by Fraser Tweedale
The first workshop was on FreeIPA. During the workshop we got to:
- Install a FreeIPA server and replica
- Enrol client machines in the domain
- Create and administer users
- Manage host-based access control (HBAC) policies
- Issue X.509 certificates for network services
- Configure a web server to use FreeIPA for user authentication and
access control
It's definitely preferable to using Active Directory or OpenLDAP or (shudder) NIS.
During the workshop we used vagrant with virtualbox. I had never used Vagrant before and was very impressed. The workshop listed Federation as one of the objectives, but we didn't have time to cover that.
I wouldn't class FreeIPA as 'true' Identity Management as it doesn't support connectors, data pumping or password synch - however it certainly does replication and federation, so that's a big plus.
3/4 - Packets don't lie: how can you use tcpdump/tshark (wireshark) to prove your point. by Sergey Guzenkov
The final workshop of the day was on wireshark. Now I've been using wireshark for years, so I was looking forward to something I had not seen before. I wasn't disappointed.
It was almost impossible to keep up with the lightning pace of this workshop. We quickly covered the basics of wireshark and tcpdump and launched straight into capturing SSL keys and decrypting SSL packets.
We also covered many of the little used switches on both tshark and tcpdump and how they can be used to generate statistics for traffic reports. We also used mergecap, capinfos and dumpcap tools.
No comments:
Post a Comment