<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>security | FLRNKS</title><link>https://flrnks.netlify.app/category/security/</link><atom:link href="https://flrnks.netlify.app/category/security/index.xml" rel="self" type="application/rss+xml"/><description>security</description><generator>Source Themes Academic (https://sourcethemes.com/academic/)</generator><language>en-us</language><copyright>© 2024</copyright><lastBuildDate>Thu, 26 Nov 2020 11:11:00 +0000</lastBuildDate><image><url>https://flrnks.netlify.app/images/icon_hu0b7a4cb9992c9ac0e91bd28ffd38dd00_9727_512x512_fill_lanczos_center_2.png</url><title>security</title><link>https://flrnks.netlify.app/category/security/</link></image><item><title>Cloud Security Automation</title><link>https://flrnks.netlify.app/post/sans-sec540/</link><pubDate>Thu, 26 Nov 2020 11:11:00 +0000</pubDate><guid>https://flrnks.netlify.app/post/sans-sec540/</guid><description>&lt;p>In November 2020 I was lucky to have had the chance to take part in my 2nd SANS course of the year: &lt;strong>SEC540 - Cloud Security and DevOps Automation -&lt;/strong> as part of the
&lt;a href="https://www.sans.org/event/amsterdam-november-2020-live-online" target="_blank" rel="noopener">SANS Amsterdam&lt;/a>. Unlike the first one, this was conducted in a remote-only format that they call &lt;strong>LiveOnline&lt;/strong>. I liked it so much that I wanted to share it. If interested, you can read more about my experience of &lt;strong>SEC530 - Defensible Security Architecture -&lt;/strong> in
&lt;a href="https://flrnks.netlify.app/post/sans-sec530">this post&lt;/a> which was an on-site/in-person course as part of the
&lt;a href="https://www.sans.org/event/prague-march-2020" target="_blank" rel="noopener">SANS Prague&lt;/a> in March 2020.&lt;/p>
&lt;h2 id="pre-course">Pre-Course&lt;/h2>
&lt;p>About a week before the course was set to begin, I received the Course Booklets via UPS delivery. It was a bit surprising that they did not send an email with the tracking ID, so I was caught off-guard when I was told I needed to pick it up in a nearby UPS affiliate shop. Nevertheless, it was quite fast and efficient, so there were no issues there.&lt;/p>
&lt;p>Since this was a &lt;strong>LiveOnline&lt;/strong> course, I needed to download a few things from my SANS account in advance, that normally would be distributed on USB sticks at the start of an in-person course. Luckily they send numerous email reminders about this, and there are also great instructions available online, such as
&lt;a href="https://sansorg.egnyte.com/dl/wO5QUU3BK5/Power_Computing_-_Generic_Laptop_Requirements_Checklist_v2.0.docx_" target="_blank" rel="noopener">THIS&lt;/a> document.&lt;/p>
&lt;p>The most important item to download was of course the course VM for the Lab Exercises. For this course, it was a 9 GB iso file which had the compressed VMWare virtual machine image in it. This VM required quite substantial resources, so I felt lucky to have a work laptop that has 32 GB RAM with an 8 core Intel i9 CPU and 1 TB of SSD storage. The RAM was especially critical for the VM, it needed at least 12 GB, but I gave it 16 just to be sure. For students whose machine was no powerful enough they had an AMI image in AWS with a Cloudformation template to set it up quickly.&lt;/p>
&lt;p>In addition, we needed to download and set up Slack for chat support during the course and GoToTraining for the actual streaming of the course content. I found that for whatever reason the GoToTraining session was spiking my laptop&amp;rsquo;s CPU usage to a point that it was almost overheating, so I decided to use my Table for the course streaming, which worked quite well.&lt;/p>
&lt;p>Last but not least, I also downloaded the course booklets in pdf format, however they were heavily protected with watermarks and a complex password. Copy-pasting was also disabled. It would have been nice if I could open the pdfs on my tablet and use my pencil to write on it, but since I also had the printed booklets this was a minor annoyance.&lt;/p>
&lt;h2 id="course-content">Course Content&lt;/h2>
&lt;p>The first day started with an introduction to the principles of DevOps and how Security can be integrated into CI/CD pipelines. In between the topics, we were getting familiar with the student VM which is home to the Lab Exercises. I have to admit that at first I was quite overwhelmed by the complex setup that&amp;rsquo;s shipped in this single VM image. There were a surprising number of services running in docker containers behind the scenes, such as Jenkins, GitLab and Hashicorp Vault.&lt;/p>
&lt;p>As part of the day 1 labs we practiced the deployment of a web service using
&lt;a href="https://www.jenkins.io/" target="_blank" rel="noopener">Jenkins&lt;/a>. We also implemented improved security via pre-commit scanning and Security Analysis (SAST/DAST) as part of the CI/CD pipeline. The next day we set up the environment that paved our journey to the cloud (AWS) relying on concepts such as Infrastructure-as-Code (
&lt;a href="https://aws.amazon.com/cloudformation/" target="_blank" rel="noopener">Cloudformation&lt;/a>) and Configuration Management (
&lt;a href="https://puppet.com/" target="_blank" rel="noopener">Puppet&lt;/a>). On day 3 we embarked on a journey to harden our cloud infrastructure with tools that can do Security Scanning and Continuous Monitoring and Alerting (
&lt;a href="https://grafana.com/" target="_blank" rel="noopener">Grafana&lt;/a> &amp;amp;
&lt;a href="https://aws.amazon.com/cloudwatch/" target="_blank" rel="noopener">CloudWatch&lt;/a>). We also looked into secrets management best practices on-premise and in the cloud via
&lt;a href="https://www.vaultproject.io/" target="_blank" rel="noopener">Hashicorp Vault&lt;/a>. On day 4 we fixed some vulnerabilities in our web service using a blue/green deployment setup to minimize downtime. We also looked into protecting microservice APIs using serverless functions that aim to manage authorization and access control. On the final day we looked into certain concepts related to compliance in cloud environments and explored technologies such as
&lt;a href="https://aws.amazon.com/waf/" target="_blank" rel="noopener">AWS WAF&lt;/a>,
&lt;a href="https://duo.com/blog/introducing-cloudmapper-an-aws-visualization-tool" target="_blank" rel="noopener">CloudMapper&lt;/a> and
&lt;a href="https://cloudcustodian.io/" target="_blank" rel="noopener">Cloud Custodian&lt;/a>.&lt;/p>
&lt;p>I have to admit that the lab environment that&amp;rsquo;s set up in the Student VM was pretty impressive to me. There were so many moving parts to it, yet everything worked more or less seamlessly. The built-in Wiki always provided detailed instructions with copy-paste support to allow you to work through each lab even if you were unfamiliar with the technology. If you were stuck you could get help very quickly from the Teaching Assistant, or the Instructor as well. Overall they did an excellent job over the 5 days of the course.&lt;/p>
&lt;h2 id="netwars">NetWars&lt;/h2>
&lt;p>This post would not be complete without mention of the NetWars arena which I was very keen to take part in. During &lt;strong>#SEC530&lt;/strong> in March 2020, the NetWars arena was open only on Day 6 when we competed against each other in teams. Thanks to this course, I was invited to several free NetWars events afterwards, such as
&lt;a href="https://www.sans.org/cyber-ranges/netwars-tournaments/core/" target="_blank" rel="noopener">Core NetWars&lt;/a> and the Mini NetWars Missions 1-2-3-4.&lt;/p>
&lt;p>I am quite certain that these free NetWars sessions helped me immensely to hone my CTF skillz, that would come in handy during &lt;strong>#SEC540&lt;/strong> where I had 4 full days to compete. I jumped to the front of the leader board already after the first night, as I stayed up until 3 am working on the NetWars questions. This was a bit reckless as I was a bit tired the day after, so my focus on the course material was not the best, but a few rounds of coffee helped with that.&lt;/p>
&lt;p>&lt;img src="scoreboard.png" alt="SEC540-NetWars-Scoreboard">&lt;/p>
&lt;p>In the end I managed to keep my position on the top of the leaderboard which made me feel really proud as I&amp;rsquo;ve worked really long and hard during the whole week. I even managed to solve some of the more advanced &lt;code>1337&lt;/code> challenges that had no hints, just a description of what was required and we were free to improvise the solution.&lt;/p>
&lt;p>Two months later my 2nd NetWars coin has finally arrived by post 🤩&lt;/p>
&lt;p>&lt;img src="coin.jpg" alt="SEC540-NetWars-Coin">&lt;/p>
&lt;h2 id="conclusions">Conclusions&lt;/h2>
&lt;p>Initially I was quite hesitant about attending &lt;strong>SEC540&lt;/strong> in the &lt;strong>LiveOnline&lt;/strong> format as I was not sure if it would work well. In the end I was left with only positive feelings about it. The course content was excellent. The delivery was smooth and help was always available through the Slack channel. If someone wants to learn about DevOps, Cloud and Security, I highly recommend this SANS course!&lt;/p>
&lt;h3 id="ps">P.S.&lt;/h3>
&lt;p>On the 1st of February, 2.5 months after my class I successfully passed the GIAC exam and became GCSA certified! 🎉&lt;/p></description></item><item><title>Defensible Security Architecture</title><link>https://flrnks.netlify.app/post/sans-sec530/</link><pubDate>Wed, 22 Apr 2020 11:11:00 +0000</pubDate><guid>https://flrnks.netlify.app/post/sans-sec530/</guid><description>&lt;p>In this post I wanted to write about my experience with #SEC530 which is a SANS course that I took in March during the
&lt;a href="https://www.sans.org/event/prague-march-2020/" target="_blank" rel="noopener">SANS Prague&lt;/a> event. Not long ago I wrote another
&lt;a href="https://flrnks.netlify.app/post/sans-netwars/">post&lt;/a> about my experience with NetWars in March, now I wanted to write about the infosec course that started it all.&lt;/p>
&lt;h2 id="defensible-security-architecture---sec530">Defensible Security Architecture - SEC530&lt;/h2>
&lt;p>Initially I was hesitant to register for an advanced level SANS course (5xx in the code). As I had no previous experience with SANS I did not know if an advanced infosec course would be too difficult for me. Luckily, I found a GIAC assessment exam online called &lt;strong>SANS Cybertalent Assessment Exam&lt;/strong>, which I took for free and eventually passed with a score of 93.33%. This made me confident in registering for #SEC530, as the assessment results stated:&lt;/p>
&lt;p>&lt;em>&amp;ldquo;Examinees who score in this range have demonstrated reliable knowledge in core information security principles [&amp;hellip;] they are typically ready for advanced security training&amp;rdquo;&lt;/em>.&lt;/p>
&lt;p>&lt;img src="cybertalent.png" alt="cyber-talent-assessment">&lt;/p>
&lt;h2 id="course-experience">Course Experience&lt;/h2>
&lt;h3 id="day-1">Day 1&lt;/h3>
&lt;p>The course was taking place at a hotel in Prague 5, about 10 mins walk from my flat, so I was quite happy about the venue. It was a nice hotel with plenty of room for my course and the other ones that were running in parallel with a dozen or so attendees each:&lt;/p>
&lt;ul>
&lt;li>
&lt;a href="https://www.sans.org/event/prague-march-2020/course/security-essentials-bootcamp-style" target="_blank" rel="noopener">#SEC401&lt;/a> - &lt;strong>Security Essentials Bootcamp Style&lt;/strong>&lt;/li>
&lt;li>
&lt;a href="https://www.sans.org/event/prague-march-2020/course/hacker-techniques-exploits-incident-handling" target="_blank" rel="noopener">#SEC504&lt;/a> - &lt;strong>Hacker Tools, Techniques, Exploits and Incident Handling&lt;/strong>&lt;/li>
&lt;/ul>
&lt;p>Some colleagues were taking #SEC504, I was alone from my workplace in taking #SEC530. This was nice because knowing nobody in my class forced me to get to know them, and they all turned out to be interesting people! This was also a good opportunity to start recruiting team mates for the NetWars challenge on Day 6!&lt;/p>
&lt;p>Our instructor was Mr.
&lt;a href="https://www.sans.org/instructors/ryan-nicholson" target="_blank" rel="noopener">Ryan Nicholson&lt;/a> from the United States with an interesting career path that led him to become a SANS Instructor. He used to be a Network Administrator in the past and made lots of references to Cisco networking equipment which made me quite nostalgic from time to time &amp;hellip; 😊&lt;/p>
&lt;p>Eventually the course kicked off and the first day&amp;rsquo;s goal was to get an overview of Defensible Security Architecture. We discussed the downsides of traditional approach to security and architecture, and how the defensible approach may improve the situation. We were given a recommended reading by Richard Bejtlich titled &lt;strong>The Tao of Network Security Monitoring&lt;/strong>, in which there is a really neat definition: &lt;strong>architecture that encourages, rather than frustrates, digital self-defence&lt;/strong>.&lt;/p>
&lt;p>The rest of the day we discussed many interesting topics, including the Layer 2 security that led to a discovery about the WLAN at the hotel: &lt;strong>station isolation&lt;/strong> was not enabled! This wouldn&amp;rsquo;t be a huge deal normally, but then we became aware of some fellow SANS students in the adjacent room taking the #SEC504 which is a red-team course that has topics such as penetration testing. This inspired me to take some actions as a blue-teamer, which I hoped would earn me the infamous Red coin for #SEC530&amp;hellip; More on this later in the &lt;code>Blue Team Project&lt;/code> section.&lt;/p>
&lt;h3 id="day-2">Day 2&lt;/h3>
&lt;p>After an interesting first day, we dived right-in to the material on the 2nd day titled: &lt;strong>Network Security Architecture and Engineering&lt;/strong>. This day taught me many interesting topics of L3 security, and provided some interesting lab exercises as well. Most interesting to me was the lab on the config auditing tool called &lt;code>nipper-ng&lt;/code> that can parse Cisco router/switch config files for security issues and provide actionable recommendations. This surely would have been a nice tool to have back when I worked as a Network Administrator.&lt;/p>
&lt;h3 id="day-3">Day 3&lt;/h3>
&lt;p>We continued with the material on the third day with &lt;strong>Network-Centric Security&lt;/strong> with a bunch of different topics on the menu, such as Next Generation Firewalls (NGFW), &lt;strong>Network Security Monitoring&lt;/strong> (NSM) and Secure Remote Access, just to name a few. Probably the most interesting topic for me was NSM that involves the passive capture (in- or out-of-band) and analysis of network / flow metadata. This gave me some good ideas for the &lt;code>Blue Team Project&lt;/code> described in a later section.&lt;/p>
&lt;p>After our lunch break, just before we resumed class, someone from the SANS support team came to our classroom and informed us that they decided to convert the class to remote/virtual mode of operation for the rest of the week, as a safety measure against the COVID-19 pandemic. Although it was quite frustrating to me at the time, I now totally agree with their approach to handling this safety concern. Eventually they did an excellent job of converting the class to run via the virtual CyberCast platform on such short notice!&lt;/p>
&lt;h3 id="day-4">Day 4&lt;/h3>
&lt;p>So on the morning o day four, I did not go to the nearby hotel where the first three days were held, instead I just logged in to my SANS account and accessed the CyberCast session where we continued the course. The teaching duty was split between two new remote instructors from the USA: for the first half of the day we had Mr.
&lt;a href="https://www.sans.org/instructors/greg-scheidel" target="_blank" rel="noopener">Greg Scheidel&lt;/a>, in the afternoon Mr.
&lt;a href="https://www.sans.org/instructors/ismael-valenzuela" target="_blank" rel="noopener">Ismael Valenzuela&lt;/a> took over to finish the rest of the material planned for the day.&lt;/p>
&lt;p>The main theme was &lt;strong>Data Centric Security&lt;/strong> which included topics such as Web Application Firewalls, Data Loss Prevention and some discussions on Cloud Security and containerisation technologies. This last topic was particularly interesting to me, because I had been learning about Docker prior to the SANS training and I had not really considered it from a security point of view before.&lt;/p>
&lt;h3 id="day-5">Day 5&lt;/h3>
&lt;p>This fifth day was dedicated to &lt;strong>Zero Trust Security Architecture&lt;/strong>, which was quite a new and interesting concept to me. During the first half of the day we covered the basic principles of Zero Trust (everything is hostile, verify before establishing trust) and how certain techniques such as mutual authentication can help improve security. The second half of the day with Ismael included some interesting topics such as Security Information and Event Management systems (SIEMs) which are indispensable tools for Security Operations Centres (SOC). This section also proved to have some very valuable lab exercises for the NetWars challenge the following day.&lt;/p>
&lt;h3 id="day-6---netwars">Day 6 - NetWars&lt;/h3>
&lt;p>This final day was dedicated to the DTF-style &lt;strong>NetWars Challenge&lt;/strong> that ran for about 6 hours. Three teams were formed amongst the class participants who competed against each other and agains the clock to solve the challenge questions that were testing our concepts taught during the course. I have to say I genuinely enjoyed every second of it. Our team was leading the scoreboard all the way until the very end, when we got kicked down to the 2nd place because we rushed to be the first and incurred some penalty for incorrect answers. Regardless of the final result, it was a very valuable experience with tons of fun and learning. For our efforts that got us the 2nd place, were rewarded with the much coveted blue coin of #SEC530 which &lt;del>will hopefully arrive by FedEx soon&lt;/del> has arrived to me in Prague via FedEx finally &amp;hellip; :)&lt;/p>
&lt;p>&lt;img src="blue-coin.png" alt="bluec-coin">&lt;/p>
&lt;h3 id="blue-team-project">Blue Team Project&lt;/h3>
&lt;p>As I previously mentioned, on the first day we discovered that all attendees of the SANS venue will be sharing a WLAN network without &lt;strong>station isolation&lt;/strong> and this was making me somewhat uncomfortable. Some years ago in a university course I had done some simple attacks using MITM technique on shared LAN networks, so I knew that it was not too difficult to steal credentials or do other kinds of malicious attacks when the attacker didn&amp;rsquo;t even have to crack the wifi password to be able to join the shared WLAN.&lt;/p>
&lt;p>Later I was wondering that perhaps the WLAN isolation feature was disabled on purpose so that the red-team students in the adjacent room could practice using some of the typical penetration testing tools. Regardless, this vulnerability enabled by the lack of WLAN isolation gave me the idea to implement some kind of defence system that can monitor and/or if possible alert me to any seemingly malicious attempts targeting my machine.&lt;/p>
&lt;p>My first idea was to run a packet capture on my Host OS via Wireshark, but of course that would have been very difficult to manage and quite likely not so effective! I would&amp;rsquo;ve had to keep an eye on it constantly and check for suspicious packets manually using some filters.&lt;/p>
&lt;p>Instead, I got some inspiration from one of the lab exercises with the ELK stack where we had to look for some suspicious log entries from various sources of security telemetry. I decided to set up a similar set of services to run non-stop on my #SEC530 virtual machine. To provide the network metadata I needed, I decided to install
&lt;a href="https://www.elastic.co/beats/packetbeat" target="_blank" rel="noopener">PacketBeat&lt;/a> and configured it to extract and forward &lt;strong>netflow&lt;/strong> data to the ELK stack. This way I could obtain the necessary visibility into the network activity on my Virtual Machine, without the need to do full packet capture using WireShark!&lt;/p>
&lt;p>With the below steps one can run the ELK stack via docker-compose in the #SEC530 VM:&lt;/p>
&lt;div class="highlight">&lt;pre class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="c1"># ELK stack setup&lt;/span>
mkdir monitor &lt;span class="o">&amp;amp;&amp;amp;&lt;/span> &lt;span class="nb">cd&lt;/span> monitor
cp /labs/1.3/docker-compose.yml ./
sed -i &lt;span class="s1">&amp;#39;17,18 s/^/#/&amp;#39;&lt;/span> docker-compose.yml &lt;span class="c1">#comment out some volumes not needed&lt;/span>
sed -i &lt;span class="s1">&amp;#39;s/lab13es/elastic_search/g&amp;#39;&lt;/span> docker-compose.yml
sed -i &lt;span class="s1">&amp;#39;s/kibana13/kibana_dashboard/g&amp;#39;&lt;/span> docker-compose.yml
docker container prune -f
docker-compose up
&lt;/code>&lt;/pre>&lt;/div>&lt;p>Next I set installed and configured the OSS version of PacketBeat:&lt;/p>
&lt;div class="highlight">&lt;pre class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="c1"># PacketBeat setup&lt;/span>
curl -L -O https://artifacts.elastic.co/downloads/beats/packetbeat/packetbeat-oss-7.6.1-amd64.deb
sudo dpkg -i packetbeat-oss-7.6.1-amd64.deb
&lt;span class="nb">echo&lt;/span> &lt;span class="s2">&amp;#34;setup.dashboards.enabled: true&amp;#34;&lt;/span> &lt;span class="p">|&lt;/span> sudo tee -a /etc/packetbeat/packetbeat.yml
sudo packetbeat setup --dashboards
sudo service packetbeat start
&lt;/code>&lt;/pre>&lt;/div>&lt;p>Now, one can test if it&amp;rsquo;s working by generating some network traffic from the VM which should then appear in the Kibana dashboard at &lt;code>http://localhost:5601/app/kibana&lt;/code>.&lt;/p>
&lt;p>&lt;img src="kibana.png" alt="kibana">&lt;/p>
&lt;p>At this point, it becomes possible to observe malicious hacking attempts by focusing on IP addresses from my local IP subnet&amp;hellip; But I was not yet fully satisfied and wanted to take it a bit further.&lt;/p>
&lt;h3 id="blue-team-project---next-level">Blue Team Project - Next Level&lt;/h3>
&lt;p>It was quite nice to see &lt;strong>netflow&lt;/strong> data being exported to the ELK stack in the previous setup, however I was a bit disappointed with the Kibana dashboards that were set up by PacketBeat. Some were completely dysfunctional due to some syntax errors I could not figure out how to fix.&lt;/p>
&lt;p>I spent quite a long time looking for a fix to the Kibana dashboard issues, but eventually I ended up swapping my ELK &amp;amp; PacketBeat setup for a more advanced set of Tools:
&lt;a href="https://securityonion.net/" target="_blank" rel="noopener">The Security Onion&lt;/a>! Turns out that it also uses docker to run the ELK stack behind the scenes. In addition, it includes some tools such as &lt;strong>Zeek/Bro&lt;/strong>, &lt;strong>Suricata/Snort&lt;/strong> right out of the box, that we also covered in the course. So cool!&lt;/p>
&lt;p>Setting it all up on the #SEC530 VM was a bit more lengthy than my previous setup. First I had to add some additional juice to the underlying VM (4 CPUs and min 8GB of RAM) which then I followed up with the below installation steps on a fresh clone of the #SEC530 VM:&lt;/p>
&lt;ul>
&lt;li>
&lt;p>Set the VM NIC mode to bridge (Autodetect) (in VMWare Fusion)&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Boot the VM, log in and change the settings in &lt;strong>Software &amp;amp; Updates&lt;/strong>:&lt;/p>
&lt;ul>
&lt;li>on &lt;strong>Ubuntu Software&lt;/strong> tab check all options except &lt;strong>restricted software&lt;/strong>&lt;/li>
&lt;li>on &lt;strong>Updates&lt;/strong> tab select the first two options&lt;/li>
&lt;li>click &lt;strong>Close&lt;/strong> and then click &lt;strong>Reload&lt;/strong> to latest updates&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>
&lt;p>Next run these steps in the Terminal (adopted from
&lt;a href="https://securityonion.readthedocs.io/en/latest/installing-on-ubuntu.html" target="_blank" rel="noopener">here&lt;/a>):&lt;/p>
&lt;div class="highlight">&lt;pre class="chroma">&lt;code class="language-shell" data-lang="shell">&lt;span class="nb">echo&lt;/span> &lt;span class="s2">&amp;#34;debconf debconf/frontend select noninteractive&amp;#34;&lt;/span> &lt;span class="p">|&lt;/span> sudo debconf-set-selections
sudo rm -rf /var/lib/apt/lists/*
sudo apt-get update
sudo apt-get -y install software-properties-common
sudo add-apt-repository -y ppa:securityonion/stable
sudo apt-get update
sudo apt-get -y -f -o Dpkg::Options::&lt;span class="o">=&lt;/span>&lt;span class="s2">&amp;#34;--force-overwrite&amp;#34;&lt;/span> install securityonion-all securityonion-onionsalt securityonion-suricata syslog-ng-core
&lt;/code>&lt;/pre>&lt;/div>&lt;/li>
&lt;/ul>
&lt;p>The above steps install necessary dependencies and then create a desktop shortcut called &lt;strong>Setup&lt;/strong> with the Security Onion icon. Double-click it to continue the install process (alternatively issue &lt;code>sudo sosetup&lt;/code> in Terminal):&lt;/p>
&lt;ul>
&lt;li>chose to reconfigure the network interfaces (with DHCP)&lt;/li>
&lt;li>accept the necessary reboot now&lt;/li>
&lt;li>trigger the Setup process again to finish the installation&lt;/li>
&lt;li>chose &lt;strong>Evaluation Mode&lt;/strong> when it asks this question&lt;/li>
&lt;li>set up default username/password used to secure the various dashboards&lt;/li>
&lt;/ul>
&lt;p>Once the setup finishes, it takes a few minutes, it will show several additional popup windows with useful information about the Security Onion&amp;rsquo;s functions, while also several new desktop icons will appear:&lt;/p>
&lt;p>&lt;img src="setup-done.png" alt="install-onion">&lt;/p>
&lt;p>At this point, the setup is complete and you can see the installed services by clicking on the new icons on the Desktop. Most interesting to me was the &lt;strong>Kibana dashboard&lt;/strong> which comes pre-loaded with some amazing features out of the box:&lt;/p>
&lt;p>&lt;img src="kibana-onion.png" alt="kibana-onion">&lt;/p>
&lt;p>This really seems like an awesome set of features that can detect malicious attacks much better than my first setup with &lt;strong>ELK &amp;amp; Packetbeat&lt;/strong>. This is exactly what I was looking for, when I was on that shared WLAN, some advanced visibility into network metadata. I&amp;rsquo;m glad I did not have to implement it by hand after all &amp;hellip; :)&lt;/p>
&lt;h3 id="blue-team-project---next-next-level">Blue Team Project - Next Next Level&lt;/h3>
&lt;p>While looking around on the net for possible solutions to my issues, I stumbled upon this project from
&lt;a href="https://github.com/dtag-dev-sec/tpotce/tree/master/docker" target="_blank" rel="noopener">Telekom Security&lt;/a>&amp;lsquo;s GitHub page, which seemed like an even more advanced version of the Security Onion with various types of built-in honeypots that feed information to a Kibana dashboard. Sadly however, this is not possible to set up on the #SEC530 VM because the built-in installer does not support Xubuntu 16.04 and there were so many moving parts to the project that I did not dare to do it all by hand. For now I just keep it here as a reference, maybe in a future post I will describe it in more detail!&lt;/p>
&lt;h2 id="conclusion">Conclusion&lt;/h2>
&lt;p>As I already mentioned, this was my first SANS training and I could not be happier about the whole experience, despite the unfortunate situation with the global pandemic disrupting our onsite course. While I was initially a bit worried about the lack of &lt;code>station isolation&lt;/code> on the shared WLAN, I really enjoyed digging around the Internet for a solution to earn my some peace of mind. The knowledge and new skills I acquired in the domain of Defensible Security Architecture have been quite overwhelming to say the least.&lt;/p>
&lt;p>I also enjoyed building new connections with the people who run these trainings and with my fellow SANS alumni. Taking part in the NetWars events that followed in March and April, I felt good to be part of such an incredible community.&lt;/p></description></item><item><title>SANS NetWars in March</title><link>https://flrnks.netlify.app/post/sans-netwars/</link><pubDate>Sat, 04 Apr 2020 11:11:00 +0000</pubDate><guid>https://flrnks.netlify.app/post/sans-netwars/</guid><description>&lt;p>This past month of March was quite eventful, to say the least, with all the news of this pandemic shaking many different segments of our globalised society. It&amp;rsquo;s virtually impossible to escape the constant flow of news in the media. While March was practically defined by the continuously evolving story of the virus, I wanted to write a new blog post about a different topic that also greatly impacted this month for me: a live SANS course I took attended in Prague and some online CTF challenges organised by SANS and the Counter Hack team.&lt;/p>
&lt;h2 id="sans-prague-march-2020">SANS Prague March 2020&lt;/h2>
&lt;p>I still remember how excited I was when I learnt that my employer will sponsor my attendance a 6 days long
&lt;a href="https://www.sans.org/event/prague-march-2020" target="_blank" rel="noopener">SANS&lt;/a> course in March, taking place in the city where I live and work currently. I was eagerly looking forward to it, taking place between 9th and 14th of March.&lt;/p>
&lt;p>&lt;img src="sans_prague.jpg" alt="SANS-Prague">&lt;/p>
&lt;p>The course was arranged in a very nice hotel in Prague 5 district, and we were hosted by a very friendly SANS staff that included some world-class teachers. I really liked how well they organised everything and tried to spoil us with good food. There were actually several courses running in parallel, my course, the
&lt;a href="https://www.sans.org/course/defensible-security-architecture-and-engineering" target="_blank" rel="noopener">SEC530&lt;/a>, a.k.a &lt;strong>Defensible Security Architecture and Engineering&lt;/strong>, was taught by Ryan Nicholson, who did a great job during the first 3 days.&lt;/p>
&lt;p>Sadly however, on Wednesday (11th of March) we were instructed to go home due to the growing risk of contacting the COVID-19 virus. All was not lost, because the SANS team did their best to convert the whole class to an online CyberCast while the course was in progress. So from the next day onward, we continued remotely with new instructors, who jumped in, while Ryan was on his way back to the States. Initially we thought he would continue hosting the CyberCast from his hotel room, but eventually we got to know two new SANS instructors, Greg Scheidel and Ismael Valenzuela, who took turns teaching the rest of the course material and then hosting the NetWars event for us.&lt;/p>
&lt;h2 id="sans-netwars">SANS NetWars&lt;/h2>
&lt;p>While the raw educational content of Sec530 was great, I most enjoyed the last day of the course when we got to take part in a private NetWars challenge hosted just for the participants of the course, which was about 10-15 people. I had some initial ideas about what NetWars was all about, thanks to numerous cleverly placed banners in Holiday Hack Challenges from previous years, I never actually got to participate in one before so it was a completely new experience for me. And I was immediately loving it so much, that when it was over I knew I wanted more!&lt;/p>
&lt;!-- ![SEC530-Coin](https://pbs.twimg.com/media/D9g4yNrWwAE8H8h?format=jpg&amp;name=4096x4096) -->
&lt;p>So you can imagine how excited I was when I learnt that SANS was going to offer a bunch of
&lt;a href="https://www.sans.org/blog/and-now-for-something-awesome-sans-launches-new-series-of-worldwide-capture-the-flag-cyber-events/" target="_blank" rel="noopener">free NetWars events&lt;/a> for SANS alumni, with some special events open to the whole world to take part in! First one was a two-day Core NetWars Tournament, first of its kind, organised completely online via CyberCast from 19th to 20th of March. Due to timezone differences, it lasted until 2 am on both days, but I loved every second of it! While I had no high hopes of winning, I was surprised how well I did, eventually finishing as 12th amongst the first time NetWars players.&lt;/p>
&lt;!-- ![Core-NetWars](core-netwars.jpg) -->
&lt;p>Next up was the Mini NetWars Mission 1, also first of its kind, from 2nd till 3rd of April. This was a bit different from Core NetWars, as we did not have to solve the challenges in a virtualised OS environment, instead we relied solely on the browser, very similar to how the Holiday Hack environment works, which was already quite familiar to me!&lt;/p>
&lt;p>This time many more people signed up, as registration was not limited to just SANS alumni but open to the public. Eventually we were more than 500 people competing! This time I managed to solve all of the objectives and obtained the maximum score of 92 which qualified me as a
&lt;a href="https://www.counterhackchallenges.com/winners" target="_blank" rel="noopener">winner&lt;/a>. My final placement on the ranking was somewhere around 50th, as I took a number of hints and was a bit slower than others. Nevertheless, I was still amazed by how far I have come. By the way, this is my battle station setup, which won me some cool SANS swag on
&lt;a href="https://twitter.com/SANSInstitute/status/1246150677602226176" target="_blank" rel="noopener">Twitter&lt;/a> :)&lt;/p>
&lt;p>&lt;img src="mini-netwars.jpg" alt="Mini-NetWars">&lt;/p>
&lt;h2 id="conclusion">CONCLUSION&lt;/h2>
&lt;p>All in all, I cannot thanks SANS enough for hosting these alumni NetWars events, some completely free for the whole cyber security community. I am probably not alone in feeling that they did an amazing service to us all, who are probably stuck at home due to social distancing and quarantine measures implemented world wide. This month for me was surely made a bit special, so big thanks to SANS and the Counter Hack team for all that their efforts!&lt;/p>
&lt;p>&lt;strong>P.S.:&lt;/strong>: A very very very cool Spotify Playlist, which works wonders during such CTF contests, is available via this
&lt;a href="https://open.spotify.com/playlist/2KwHJlC1x117sXWR0CKZWW?si=H3V76HhzSwi_Bu5Wqut7qQ" target="_blank" rel="noopener">link&lt;/a>. I cannot take credit for it, it belongs to Bryce Galbraith who moderated these two previous NetWars events and was kind enough to share his playlist with us.&lt;/p></description></item><item><title>KringleCon II</title><link>https://flrnks.netlify.app/post/kringlecon-writeup/</link><pubDate>Mon, 13 Jan 2020 11:11:00 +0000</pubDate><guid>https://flrnks.netlify.app/post/kringlecon-writeup/</guid><description>&lt;p>In this post I just wanted to announce and link to my write-up in the Tutorials section of my blog, which chronicles my solution to the challenges of the most fun CTF of the holiday season.&lt;/p>
&lt;p>&lt;img src="sans-main.png" alt="HHC 2019">&lt;/p>
&lt;p>A huge thank you goes out to the SANS Institute and the Counter Hack Team who are the organisers of this event. They put a great deal of energy and effort year after year to host this event. It is no wonder the campus of the Elf University was sometimes so crowded, you could barely see your own avatar! :)&lt;/p>
&lt;p>&lt;img src="crowd.png" alt="Crowds at Elf University">&lt;/p>
&lt;p>To get to the write-up, either click
&lt;a href="https://flrnks.netlify.app/tutorials/kringlecon2019/">this&lt;/a> link, or manually go to the Tutorials section in the top bar. I also welcome any kind of feedback or comment on the write-up, to do so please hit the Contact link in the top bar.&lt;/p></description></item></channel></rss>