DevOps Conference 2018 Munich, 3 - 6 December 2018
The Conference for Continuous Delivery, Microservices,
Containers, Clouds and Lean Business

Pentesting Workshop: How to Master Your Offensive Security Toolstack

Power Workshop
Infos
Thursday, December 6 2018
09:00 - 17:00
Room:
München
Booking note:
Security Workshop

In this hands-on workshop we’ll all attack the training web app to take on the role of a pentester one step at a time. You’ll learn how to work with professional security tools through a range of practical tasks and will also learn pentesters’ general approach for attacking web apps. Of course, we’ll also deal with defensive measures for protecting the security holes found, though our focus will remain on the systematic use of professional hacking tools for carrying out security analyses. 

As a second objective of this workshop you will learn what type of security checks can be automated and how this DevOps-style automation of security checks within build chains is best done.

Once you’ve completed this workshop, you’ll have practical experience of carrying out manual and automated attacks on web apps, which you can transfer into your own software development work so as to increase the security of your projects for the long-term.

During the course we will attack a prepared demo web-application using tools and techniques available in the Kali Linux VM. Aside from finding vulnerabilities inside this demo application, we will also use tools to escalate them into even more critical vulnerabilities during post-exploitation. 

Aside from manually using the security tools to find and exploit security vulnerabilities, most of them can also be utilized in fully automated ways, being a nice fit into DevOps architectures to enrich CI/CD pipelines with security checks.

The target audience for this hands-on workshop are developers interested in security as well as test engineers / QA wanting to include security tests into their testing arsenal and widen their toolset. 

No special deeper development or security knowledge is required to attend this workshop. But a bit of linux shell usage proves definitely helpful when joining. 

As this workshop is a tutorial rich day, there are a couple of basic requirements that need to be met if you’d like to take part in these practical tasks:

•    Laptop computer running a pre-installed copy of the “Kali Linux” VM! This Linux distro that’s designed for pentesters can be downloaded for free from https://kali.org as a VMWare image (recommended) or as a VirtualBox image or also as an ISO image file. So that you don’t have to completely wipe all the data on your laptop, it’s, of course, perfectly ok to install this into a virtual machine. Because of the time it takes to install I strongly recommend that you install Kali Linux into a VM on the laptop you’ll be bringing along so that you have a runnable copy of it before you attend the workshop.
•    Fundamental (basic) knowledge of working with the Linux command line is definitely helpful. But don’t worry, no deep Linux knowledge is required to be able to follow the supervised tutorials. Though, you shouldn’t be afraid of the bash shell and the command line interface.
•    At the workshop, I’ll share the training web app via a separate download link (approx. 30 MB) or USB stick — which we’ll then use and attack in the Kali VM.
And for those without a laptop computer during the workshop: Even without one to be able to take part in the practical tasks, you’ll obviously pick up a lot of information from the workshop. Though, if you want to test your knowledge in the scanning and attacking tasks, you really should bring along your own laptop.

Stay tuned:

Behind the Tracks

 

Docker & Kubernetes

Docker, Kubernetes & Co

Microservices

Maximize development productivity

Continuous Delivery

Build, test and deploy agile

Cloud Platforms & Serverless

Cloud-based & native apps

Logging, Monitoring & Analytics

Handle the complexity of microservices applications

Security

DevSecOps for safer applications

Business & Company Culture

Radically optimize IT

Organizational Change

Overcome obstacles on the way towards DevOps

Live Demo #slideless

Showing how technology really works