Rootconf is HasGeek’s annual conference -- and now a growing community -- around DevOps, systems engineering, DevSecOps, security and cloud. The annual Rootconf conference takes place in May each year, with the exception of 2019 when the conference will be held in June.
Besides the annual conference, we also run meetups, one-off public lectures, debates and open houses on DevOps, systems engineering, distributed systems, legacy infrastructure, and topics related to Rootconf.
This is the place to submit proposals for your work, and get them peer reviewed by practitioners from the community.
##Topics for submission:
We seek proposals -- for short and long talks, as well as workshops and tutorials -- on the following topics:
- Case studies of shift from batch processing to stream processing
- Real-life examples of service discovery
- Case studies on move from monolith to service-oriented architecture
- Network security
- Monitoring, logging and alerting -- running small-scale and large-scale systems
- Cloud architecture -- implementations and lessons learned
- Optimizing infrastructure
- Immutable infrastructure
- Aligning people and teams with infrastructure at scale
- Security for infrastructure
If you have questions/queries, write to us on firstname.lastname@example.org
From data to decisions - Leveraging OSINT data to take security decisions
As a companies grow large, they tend to leave a lot of digital trail about their infrastructure on the Internet. This information can be accessed by anyone who knows what/where to look for. The information that is available publicly is known as Open Source INTelligence(OSINT) in the hacker lingo. Attackers perform reconnaissance and gather OSINT data about their target organisations to increase the attack surface. An attacker will use these 'digital breadcrumbs’ to plan and execute their attacks against the target infrastructure.
Being able to visualise and monitor OSINT data is definitely useful to attackers such as bug bounty hunters and also anyone who is an infrastructure security professional in an organisation.
In this talk we will show how to do the following -
- Create a pipeline for gathering and storing OSINT data
- How to process & visualise the OSINT data we have already stored in step 1
- Integrate Slack to alert and monitor based on new data that we keep discovering
Specific digital breadcrumbs we will be working with:
- SSL/TLS certificates
- Domains and subdomains
- Cloud storage
- What is OSINT?
- What can attackers do with OSINT data?
- Where/How do attackers(or I) find this OSINT data? (Tools/Techniques)
- What can I do about OSINT data on my organisation?
- Building visualisation, monitoring and alerting solutions
- Monitoring an organisation’s SSL/TLS certificates, domains and subdomains in near-real time
- Visualising public datasets (scans.io) to gain insights into an organisation’s external posture
- Answering business related security questions using visualisations
- Building monitoring and alerting solutions around various OSINT data
- Key takeaways and Moving forward
- Attackers and bug bounty hunters
- Infrastructure security professionals and experts
Bharath is a Security Engineer with Appsecco. He has a strong passion for information security and building solutions that solve real world problems.
Bharath is an active member and contributor at various security and developer communities including null open security community and Python Malaysia User Group.
His core interest lies in Infrastructure security, Reconnaissance, Application security and Protocol security.
Bharath has presented at many security and developer conferences including:
- Defcon 26: Recon Village
- Bsides Delhi 2017
- Bugcrowd LevelUp 2017 & 2018
- FUDCon 2012.
Bharath has conducted trainings at various conferences including:
- c0c0n, 2018
- Nullcon, Bangalore, 2018
For more details: