+ All Categories
Home > Technology > Run your code through the Gauntlt

Run your code through the Gauntlt

Date post: 19-Oct-2014
Category:
View: 1,055 times
Download: 1 times
Share this document with a friend
Description:
Presented at DevOps Days Silicon Valley 2013. Gauntlt is a rugged testing framework to integrate security testing into your process. It was spawned out of the Rugged DevOps movement.
Popular Tags:
20
Run your code through the Gauntlt
Transcript
Page 1: Run your code through the Gauntlt

Run your code through

the

Gauntlt

Page 2: Run your code through the Gauntlt

we faced skilled

adversaries

Page 3: Run your code through the Gauntlt

we couldn’t win

Page 4: Run your code through the Gauntlt

Instead of

Engineering

InfoSec

became

Actuaries

Page 5: Run your code through the Gauntlt

“It’s

Certified”

-You

Page 6: Run your code through the Gauntlt

Your punch is soft,just like your heart

Page 7: Run your code through the Gauntlt
Page 8: Run your code through the Gauntlt

enterRugged DevOps

enter gauntlt

Philosophy

Tooling

Page 9: Run your code through the Gauntlt

$ gem install gauntlt

install gauntlt

Page 10: Run your code through the Gauntlt

gauntlt is

like this

Page 11: Run your code through the Gauntlt

sqlmap sslyze

dirbcurl

generic

nmap

your appgauntlt

exit status: 0

Page 12: Run your code through the Gauntlt

Codify your

knowledge

(cheat sheets)

Page 13: Run your code through the Gauntlt

security

testing on

every commit

Page 14: Run your code through the Gauntlt

gauntlt promotes

collaboration

Page 15: Run your code through the Gauntlt

running gauntlt with failing tests

$ gauntlt

Feature: nmap attacks for example.com

Background: Given "nmap" is installed And the following profile: | name | value | | hostname | example.com |

Scenario: Verify server is open on expected ports When I launch an "nmap" attack with: """ nmap -F www.example.com """ Then the output should contain: """ 443/tcp open https """

1 scenario (1 failed)5 steps (1 failed, 4 passed)0m18.341s

GivenWhenThen

Page 16: Run your code through the Gauntlt

$ gauntlt

Feature: nmap attacks for example.com

Background: Given "nmap" is installed And the following profile: | name | value | | hostname | example.com |

Scenario: Verify server is open on expected ports When I launch an "nmap" attack with: """ nmap -F www.example.com """ Then the output should contain: """ 443/tcp open https """

1 scenario (1 passed)4 steps (4 passed)0m18.341s

running gauntlt with passing tests

Page 17: Run your code through the Gauntlt

@slowFeature: Run dirb scan on a URL

Scenario: Run a dirb scan looking for common vulnerabilities in apache

Given "dirb" is installed And the following profile: | name | value | | hostname | http://example.com | | wordlist | vulns/apache.txt |

When I launch a "dirb" attack with: """ dirb <hostname> <dirb_wordlists_path>/<wordlist> """

Then the output should contain: """ FOUND: 0 """

.htaccess.htpasswd

.meta.web

access_logcgi

cgi-bincgi-pub

cgi-scriptdummyerror

error_loghtdocshttpd

httpd.pidicons

server-infoserver-status

logsmanualprintenvtest-cgi

tmp~bin~ftp

~nobody~root

Page 18: Run your code through the Gauntlt

gauntlt credits:

Creators:

Mani Tadayon

James Wickett

Community Wrangler: Jeremiah Shirk

Friends: Jason Chan, NetflixNeil Matatall, Twitter

Page 19: Run your code through the Gauntlt

my_first.attack

Start with the gauntlt.org tutorial

Add your config (hostname, login url, user)

Use examples from github

Repeat

#gauntlt on freenode

@gauntlt on twitter


Recommended