Top Banner
Run your code through the Gauntlt
20

Run your code through the Gauntlt

Oct 19, 2014

Download

Technology

Presented at DevOps Days Silicon Valley 2013. Gauntlt is a rugged testing framework to integrate security testing into your process. It was spawned out of the Rugged DevOps movement.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Run your code through the Gauntlt

Run your code through

the

Gauntlt

Page 2: Run your code through the Gauntlt

we faced skilled

adversaries

Page 3: Run your code through the Gauntlt

we couldn’t win

Page 4: Run your code through the Gauntlt

Instead of

Engineering

InfoSec

became

Actuaries

Page 5: Run your code through the Gauntlt

“It’s

Certified”

-You

Page 6: Run your code through the Gauntlt

Your punch is soft,just like your heart

Page 7: Run your code through the Gauntlt
Page 8: Run your code through the Gauntlt

enterRugged DevOps

enter gauntlt

Philosophy

Tooling

Page 9: Run your code through the Gauntlt

$ gem install gauntlt

install gauntlt

Page 10: Run your code through the Gauntlt

gauntlt is

like this

Page 11: Run your code through the Gauntlt

sqlmap sslyze

dirbcurl

generic

nmap

your appgauntlt

exit status: 0

Page 12: Run your code through the Gauntlt

Codify your

knowledge

(cheat sheets)

Page 13: Run your code through the Gauntlt

security

testing on

every commit

Page 14: Run your code through the Gauntlt

gauntlt promotes

collaboration

Page 15: Run your code through the Gauntlt

running gauntlt with failing tests

$ gauntlt

Feature: nmap attacks for example.com

Background: Given "nmap" is installed And the following profile: | name | value | | hostname | example.com |

Scenario: Verify server is open on expected ports When I launch an "nmap" attack with: """ nmap -F www.example.com """ Then the output should contain: """ 443/tcp open https """

1 scenario (1 failed)5 steps (1 failed, 4 passed)0m18.341s

GivenWhenThen

Page 16: Run your code through the Gauntlt

$ gauntlt

Feature: nmap attacks for example.com

Background: Given "nmap" is installed And the following profile: | name | value | | hostname | example.com |

Scenario: Verify server is open on expected ports When I launch an "nmap" attack with: """ nmap -F www.example.com """ Then the output should contain: """ 443/tcp open https """

1 scenario (1 passed)4 steps (4 passed)0m18.341s

running gauntlt with passing tests

Page 17: Run your code through the Gauntlt

@slowFeature: Run dirb scan on a URL

Scenario: Run a dirb scan looking for common vulnerabilities in apache

Given "dirb" is installed And the following profile: | name | value | | hostname | http://example.com | | wordlist | vulns/apache.txt |

When I launch a "dirb" attack with: """ dirb <hostname> <dirb_wordlists_path>/<wordlist> """

Then the output should contain: """ FOUND: 0 """

.htaccess.htpasswd

.meta.web

access_logcgi

cgi-bincgi-pub

cgi-scriptdummyerror

error_loghtdocshttpd

httpd.pidicons

server-infoserver-status

logsmanualprintenvtest-cgi

tmp~bin~ftp

~nobody~root

Page 18: Run your code through the Gauntlt

gauntlt credits:

Creators:

Mani Tadayon

James Wickett

Community Wrangler: Jeremiah Shirk

Friends: Jason Chan, NetflixNeil Matatall, Twitter

Page 19: Run your code through the Gauntlt

my_first.attack

Start with the gauntlt.org tutorial

Add your config (hostname, login url, user)

Use examples from github

Repeat

#gauntlt on freenode

@gauntlt on twitter