Call for round the year submissions for Rootconf in 2020

Call for round the year submissions for Rootconf in 2020

Submit a proposal at any time in the year on DevOps, infrastructure security, cloud, and distributed systems. We will find you a suitable opportunity to share your work.

Bharath

@synster

From data to decisions - Leveraging OSINT data to take security decisions

Submitted Nov 22, 2018

As a companies grow large, they tend to leave a lot of digital trail about their infrastructure on the Internet. This information can be accessed by anyone who knows what/where to look for. The information that is available publicly is known as Open Source INTelligence(OSINT) in the hacker lingo. Attackers perform reconnaissance and gather OSINT data about their target organisations to increase the attack surface. An attacker will use these 'digital breadcrumbs’ to plan and execute their attacks against the target infrastructure.

Being able to visualise and monitor OSINT data is definitely useful to attackers such as bug bounty hunters and also anyone who is an infrastructure security professional in an organisation.

In this talk we will show how to do the following -

  1. Create a pipeline for gathering and storing OSINT data
  2. How to process & visualise the OSINT data we have already stored in step 1
  3. Integrate Slack to alert and monitor based on new data that we keep discovering

Specific digital breadcrumbs we will be working with:

  1. SSL/TLS certificates
  2. Domains and subdomains
  3. Cloud storage

Outline

  • What is OSINT?
  • What can attackers do with OSINT data?
  • Where/How do attackers(or I) find this OSINT data? (Tools/Techniques)
  • What can I do about OSINT data on my organisation?
  • Building visualisation, monitoring and alerting solutions
    • Monitoring an organisation’s SSL/TLS certificates, domains and subdomains in near-real time
    • Visualising public datasets (scans.io) to gain insights into an organisation’s external posture
      • Answering business related security questions using visualisations
    • Building monitoring and alerting solutions around various OSINT data
  • Key takeaways and Moving forward

Requirements

Requirements

Audience

  • Attackers and bug bounty hunters
  • Infrastructure security professionals and experts

Speaker bio

Bharath is a Security Engineer with Appsecco. He has a strong passion for information security and building solutions that solve real world problems.
Bharath is an active member and contributor at various security and developer communities including null open security community and Python Malaysia User Group.
His core interest lies in Infrastructure security, Reconnaissance, Application security and Protocol security.

Bharath has presented at many security and developer conferences including:

  • Defcon 26: Recon Village
  • Bsides Delhi 2017
  • Bugcrowd LevelUp 2017 & 2018
  • FUDCon 2012.

Bharath has conducted trainings at various conferences including:

  • c0c0n, 2018
  • Nullcon, Bangalore, 2018

For more details:

Comments

{{ gettext('Login to leave a comment') }}

{{ gettext('Post a comment…') }}
{{ gettext('New comment') }}
{{ formTitle }}

{{ errorMsg }}

{{ gettext('No comments posted yet') }}

Hosted by

We care about site reliability, cloud costs, security and data privacy