PROGRAMMING AND CYBER SECURITY

1 1 1 0 0 1 0 1 0 0 0 0 1 1 0 1 1 0 0 0 0 1 1 1 1 0
0 1 0 1 1 1 0 1 0 1 1 0 1 1 1 0 1 0
1 1 0 0 1 0 1
1 0 0 1 0 1
1 0 1 1 1 1
0 1 0 1 0 1
0 0 1 0 1 0
1 1 0 1 0 1
0 1 1 1 1 1
1 0 0 1 0
0 1 0 1 0 0
1 1 1 0 0 0
1 0 1 0 1 0
0 1 1 1 1 1
1 1 0 1 1 0
1 0 1 1 1 1
1 1 1 0 1 0 0
0 1 1 0 0 1 1 1
0 0 1 1 0 0 1 0 1 1 0 1
1 1 0 0 0 1 0 1 0 1 1 0 1 0 1 1
1 1 0 1 0 1 1 1 0 0 1 0 1 0 0 1 1 1 0 1 0
PROGRAMMING AND CYBERSECURITY
PYTHON MAURITIUS USER GROUP
VERSION: 1.0.1
DATE: 30/09/2021
AUTHOR: SYLVAIN MARTINEZ
REFERENCE: ES-CP-PACS
REPORT ENGINE: 2.1.0
CLASSIFICATION: PUBLIC
{elysiumsecurity}
cyber protection & response
DISCLAIMER
This presentation and the Services methodology, frameworks and templates used in
this document will remain the property of ES and must not be used or re-used
without explicit consent from ES unless it is already available, or becomes available,
in the public domain.
{elysiumsecurity}
cyber protection & response
2
PUBLIC
CONCLUSION
CASE STUDY
WHAT LANGUAGES
WHY PROGRAMMING
CONTEXT
{elysiumsecurity}
cyber protection & response CONTENTS
3
PUBLIC
GOAL
WHO AM I?
COMPANY
BACKGROUND
CYBER SECURITY RISK
CONCEPT
CYBER SECURITY
JOB’S RELEVANCE
AUTOMATION
TOOLING
REVERSE
ENGINEERING
EXPLOITS
MANY LANGUAGES
TO CHOOSE FROM
MOST USEFUL
LANGUAGES
POPULAR SECURITY
PROJECTS
SECURED ANDROID
APP
O365 LOGS IP SOURCE
BEWARE
TAKE AWAY
Icons: from The Noun Project unless stated otherwise
GOAL
4
TO AVOID SOME COMMON
MISTAKES
3
TO KNOW WHERE TO START
2
TO KNOW HOW
PROGRAMMING CAN BE USED
1
TO UNDERSTAND THE IMPORTANCE OF PROGRAMMING IN
CYBER SECURITY
{elysiumsecurity}
cyber protection & response
PUBLIC
CONCLUSION
CASE STUDY
WHAT
LANGUAGES
WHY
PROGRAMMING
CONTEXT
WHO AM I?
5
{elysiumsecurity}
cyber protection & response
PUBLIC
CONCLUSION
CASE STUDY
WHAT
LANGUAGES
WHY
PROGRAMMING
CONTEXT
https://www.elysiumsecurity.com
COMPANY BACKGROUND
6
{elysiumsecurity}
cyber protection & response
PUBLIC
CONCLUSION
CASE STUDY
WHAT
LANGUAGES
WHY
PROGRAMMING
CONTEXT
FOUNDED IN 2015 BY SYLVAIN MARTINEZ
INCORPORATED IN MAURITUS/UK AND OPERATING
WORLDWIDE
PROVIDING INDEPENDENT EXPERTISE IN CYBER
SECURITY
COMPREHENSIVE CYBER SECURITY SERVICE
PORTFOLIO: FROM CISO ADVISORY TO PENETRATION
TESTING AND INCIDENT RESPONSE
EXPOSURE TO A VARIETY OF BUSINESS SECTORS:
FINANCE, TELECOMS, HEALTHCARE, HOTELS,
MANUFACTORING, NAVAL, RETAIL, ETC.
BOUTIQUE STYLE APPROACH WITH A DISCREET,
TAILORED AND SPECIALIZED CYBER SECURITY
SERVICE THAT FITS YOUR WORKING ENVIRONMENT
CYBER SECURITY RISK CONTEXT
{elysiumsecurity}
cyber protection & response
7
PUBLIC
CONCLUSION
CASE STUDY
WHAT
LANGUAGES
WHY
PROGRAMMING
CONTEXT
PAST FUTURE
100%
0%
TIME
GROWTH
PAST FUTURE
100%
0%
TIME
GROWTH
PAST FUTURE
100%
0%
TIME
GROWTH
CYBER SECURITY RISKS’ PROBABILITY AND IMPACT ARE INCREASING.
THEIR ABILITY TO DISRUPT COMPANIES BUSINESS OPERATION HAVE GROWING
FINANCIAL, REPUTATIONAL AND LEGAL NEGATIVE CONSEQUENCES
+ =
CYBER SECURITY JOB’S RELEVANCE
{elysiumsecurity}
cyber protection & response
8
PUBLIC
CONCLUSION
CASE STUDY
WHAT
LANGUAGES
WHY
PROGRAMMING
CONTEXT
PROGRAMMING
KNOWLEDGE
BENEFITS
MOST MANAGEMENT
ROLE
MOST ADVISORY
ROLE
ALL TECHNICAL
ROLE
How much could knowledge of programming help you be better at your job?
ALL MANAGEMENT
ROLE
ALL ADVISORY
ROLE
ALL TECHNICAL
ROLE
PERCEPTION REALITY
AUTOMATION
{elysiumsecurity}
cyber protection & response
9
PUBLIC
CONCLUSION
CASE STUDY
WHAT
LANGUAGES
WHY
PROGRAMMING
CONTEXT
REPETITIVE TASKS
EFFICIENCY
SAVE TIME
REGEX SEARCH
FILTERING
PROCESS LARGE
VOLUME OF DATA
EXTRACT PATTERNS
FIND NEEDLE
TOOLING
{elysiumsecurity}
cyber protection & response
10
PUBLIC
CONCLUSION
CASE STUDY
WHAT
LANGUAGES
WHY
PROGRAMMING
CONTEXT
TOOLS CREATION
EFFICIENCY
CAPABILITY
TOOLS CUSTOMISATION
ADAPT AND REUSE
REVERSE ENGINEERING
{elysiumsecurity}
cyber protection & response
11
PUBLIC
CONCLUSION
CASE STUDY
WHAT
LANGUAGES
WHY
PROGRAMMING
CONTEXT
MALWARE
KNOWLEDGE
UNDERSTANDING
APP ASSESSMENT
SUSPICIOUS APP
CONTROLS BYPASS
EXPLOITS
{elysiumsecurity}
cyber protection & response
12
PUBLIC
CONCLUSION
CASE STUDY
WHAT
LANGUAGES
WHY
PROGRAMMING
CONTEXT
VULNERABILITY ASSESSMENT
ACCURACY
PENETRATION TESTING
INCREASED ATTACK
SURFACE
MANY LANGUAGES TO CHOOSE FROM
{elysiumsecurity}
cyber protection & response
13
PUBLIC
CONCLUSION
CASE STUDY
WHAT
LANGUAGES
WHY
PROGRAMMING
CONTEXT
images from exploring-data.com and graphext.com
LANGUAGES RELATIONSHIPS
MOST USED LANGUAGES
MOST USEFUL LANGUAGES
{elysiumsecurity}
cyber protection & response
14
PUBLIC
CONCLUSION
CASE STUDY
WHAT
LANGUAGES
WHY
PROGRAMMING
CONTEXT
ANY LANGUAGE IS
GOOD!
MOST COMMONLY USED LANGUAGES
IN CYBER SECURITY
PYTHON
C/C++ PHP
JAVA
PERL
SHELL
SCRIPTS
ONCE YOU UNDERSTAND THE CORE PROGRAMMING CONCEPTS YOU CAN
UNDERSTAND AND CHANGE ALMOST ANY CODE
HTML
ASM?
RUBY
POPULAR CYBER SECURITY PROJECTS EXAMPLES
{elysiumsecurity}
cyber protection & response
15
PUBLIC
CONCLUSION
CASE STUDY
WHAT
LANGUAGES
WHY
PROGRAMMING
CONTEXT
POPULAR SECURITY TOOL PURPOSE LANGUAGE
BANDIT Python code analyser PYTHON
BURP SUITE Web traffic manipulation JAVA
HAWKEYE VA Scanner PYTHON
MALTEGO Data Visualisation JAVA
METASPLOIT VAPT Framework RUBY
NIKTO Web scanner PERL
NMAP Network scanner C/PYTHON/LUA
OPENVAS VA Scanner C
RECON-NG OSINT Search PYTHON
SATAN (very) old linux scanner PERL
SCAPY Network manipulation PYTHON
SQLMAP DB Scanner PYTHON
WIRESHARK Network analyser C
SECURED ANDROID APP NEEDS TO BE TESTED
{elysiumsecurity}
cyber protection & response
16
PUBLIC
CONCLUSION
CASE STUDY
WHAT
LANGUAGES
WHY
PROGRAMMING
CONTEXT
CHALLENGE
• Need to audit an Android APK app
• App does not allow “Routing” and has “Cert pinning”
PROGRAMMING SOLUTION
• Decompile the code to Java (i.e.: d2j-dex2jar)
• Analyse the Java code for security hooks (i.e.: jd-gui)
• Decompile the code to SMALI (i.e.: apktool)
• Edit the SMALI code to remove the protection (assembly)
• Recompile and sign the code
• Execute the non-secured code and manually check for issues
NON-PROGRAMMING SOLUTION
• Use the great MobSF framework to get some automated analysis
• Give up / ask for a non-secure version
SECURED ANDROID APP NEEDS TO BE TESTED
{elysiumsecurity}
cyber protection & response
17
PUBLIC
CONCLUSION
CASE STUDY
WHAT
LANGUAGES
WHY
PROGRAMMING
CONTEXT
JAVA
SHELL SCRIPTS
ASSEMBLY/SMALI + SHELL SCRIPTS
O365 LOGS IP SOURCE IDENTIFICATION
{elysiumsecurity}
cyber protection & response
18
PUBLIC
CONCLUSION
CASE STUDY
WHAT
LANGUAGES
WHY
PROGRAMMING
CONTEXT
CHALLENGE
• O365 Audit logs list of IP
• Identify suspicious IP
PROGRAMMING SOLUTION
• Export logs as csv
• Format csv to extract list of IP
• Use IP country mapping API
• add countries against each IP
• Easily filter with countries of interest
NON-PROGRAMMING SOLUTION
• Manual IP extraction and resolution
• or Pay for extra security add-ons: Risky-sign on, conditional logins, etc
O365 LOGS IP SOURCE IDENTIFICATION
{elysiumsecurity}
cyber protection & response
19
PUBLIC
CONCLUSION
CASE STUDY
WHAT
LANGUAGES
WHY
PROGRAMMING
CONTEXT
(POWER) SHELL SCRIPT
BEWARE
{elysiumsecurity}
cyber protection & response
20
PUBLIC
CONCLUSION
CASE STUDY
WHAT
LANGUAGES
WHY
PROGRAMMING
CONTEXT
Wasting time on non
essential activities
Reinventing a “broken” and
less “efficient” wheel
i.e.: crypto
answer: ”Hello”
Customization may lead to
medium/long terms
support issues
TAKE AWAY
{elysiumsecurity}
cyber protection & response
21
PUBLIC
CONCLUSION
CASE STUDY
WHAT
LANGUAGES
WHY
PROGRAMMING
CONTEXT
GOING FURTHER
{elysiumsecurity}
cyber protection & response
22
PUBLIC
CONCLUSION
CASE STUDY
WHAT
LANGUAGES
WHY
PROGRAMMING
CONTEXT
• https://flatironschool.com/blog/best-programming-languages-cyber-
security
• https://www.sans.org/cyber-security-courses/automating-
information-security-with-python/
• A lot of free resources online, google “free python hacking course”
© 2015-2021 ELYSIUMSECURITY LTD
ALL RIGHTS RESERVED
HTTPS://WWW.ELYSIUMSECURITY.COM
CONSULTING@ELYSIUMSECURITY.COM
ABOUT ELYSIUMSECURITY LTD.
{elysiumsecurity}
cyber protection & response
ELYSIUMSECURITY PROVIDES A PORTFOLIO OF STRATEGIC
AND TACTICAL SERVICES TO HELP COMPANIES PROTECT AND
RESPOND AGAINST CYBER SECURITY THREATS. WE DIFFERENTIATE
OURSELVES BY OFFERING DISCREET, TAILORED AND SPECIALIZED
ENGAGEMENTS.
ELYSIUMSECURITY OPERATES IN MAURITIUS AND IN EUROPE,
A BOUTIQUE STYLE APPROACH MEANS WE CAN EASILY ADAPT TO
YOUR BUSINESS OPERATIONAL MODEL AND REQUIREMENTS TO PROVIDE
A PERSONALIZED SERVICE THAT FITS YOUR WORKING ENVIRONMENT.
ELYSIUMSECURITY PROVIDES PRACTICAL EXPERTISE TO IDENTIFY
VULNERABILITIES, ASSESS THEIR RISKS AND IMPACT, REMEDIATE
THOSE RISKS, PREPARE AND RESPOND TO INCIDENTS AS WELL AS
RAISE SECURITY AWARENESS THROUGH AN ORGANIZATION.
ELYSIUMSECURITY PROVIDES HIGH LEVEL EXPERTISE GATHERED
THROUGH YEARS OF BEST PRACTICES EXPERIENCE IN LARGE
INTERNATIONAL COMPANIES ALLOWING US TO PROVIDE ADVICE BEST
SUITED TO YOUR BUSINESS OPERATIONAL MODEL AND PRIORITIES.
1 of 23

Recommended

VIRTUAL CISO AND OTHER KEY CYBER ROLES by
VIRTUAL CISO AND OTHER KEY CYBER ROLESVIRTUAL CISO AND OTHER KEY CYBER ROLES
VIRTUAL CISO AND OTHER KEY CYBER ROLESSylvain Martinez
418 views10 slides
DATA LOSS PREVENTION OVERVIEW by
DATA LOSS PREVENTION OVERVIEWDATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEWSylvain Martinez
599 views21 slides
Mobile Security Assessment by
Mobile Security AssessmentMobile Security Assessment
Mobile Security AssessmentSylvain Martinez
206 views16 slides
OFFENSIVE IDS by
OFFENSIVE IDSOFFENSIVE IDS
OFFENSIVE IDSSylvain Martinez
286 views17 slides
Talk1 esc7 muscl-dataprotection_v1_2 by
Talk1 esc7 muscl-dataprotection_v1_2Talk1 esc7 muscl-dataprotection_v1_2
Talk1 esc7 muscl-dataprotection_v1_2Sylvain Martinez
183 views15 slides
The Art of CTF by
The Art of CTFThe Art of CTF
The Art of CTFSylvain Martinez
223 views22 slides

More Related Content

What's hot

Talk1 esc3 muscl-standards and regulation_v1_1 by
Talk1 esc3 muscl-standards and regulation_v1_1Talk1 esc3 muscl-standards and regulation_v1_1
Talk1 esc3 muscl-standards and regulation_v1_1Sylvain Martinez
196 views18 slides
2019 CYBER SECURITY TRENDS REPORT REVIEW by
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEWSylvain Martinez
1.8K views18 slides
INCIDENT RESPONSE CONCEPTS by
INCIDENT RESPONSE CONCEPTSINCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTSSylvain Martinez
1.3K views39 slides
Talk2 esc4 muscl-ids_v1_2 by
Talk2 esc4 muscl-ids_v1_2Talk2 esc4 muscl-ids_v1_2
Talk2 esc4 muscl-ids_v1_2Sylvain Martinez
766 views16 slides
INCIDENT RESPONSE OVERVIEW by
INCIDENT RESPONSE OVERVIEWINCIDENT RESPONSE OVERVIEW
INCIDENT RESPONSE OVERVIEWSylvain Martinez
623 views15 slides
The Internal Signs of Compromise by
The Internal Signs of CompromiseThe Internal Signs of Compromise
The Internal Signs of CompromiseFireEye, Inc.
2.6K views43 slides

What's hot(20)

Talk1 esc3 muscl-standards and regulation_v1_1 by Sylvain Martinez
Talk1 esc3 muscl-standards and regulation_v1_1Talk1 esc3 muscl-standards and regulation_v1_1
Talk1 esc3 muscl-standards and regulation_v1_1
Sylvain Martinez196 views
2019 CYBER SECURITY TRENDS REPORT REVIEW by Sylvain Martinez
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW
Sylvain Martinez1.8K views
The Internal Signs of Compromise by FireEye, Inc.
The Internal Signs of CompromiseThe Internal Signs of Compromise
The Internal Signs of Compromise
FireEye, Inc.2.6K views
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné... by Cristian Garcia G.
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
Cristian Garcia G.304 views
Ivan dragas get ahead of cybercrime by Dejan Jeremic
Ivan dragas   get ahead of cybercrimeIvan dragas   get ahead of cybercrime
Ivan dragas get ahead of cybercrime
Dejan Jeremic943 views
Ict 2015 saga - cisco cybersecurity rešenja- Viktor Varga by Dejan Jeremic
Ict 2015   saga - cisco cybersecurity rešenja- Viktor VargaIct 2015   saga - cisco cybersecurity rešenja- Viktor Varga
Ict 2015 saga - cisco cybersecurity rešenja- Viktor Varga
Dejan Jeremic852 views
Detection and Response with Splunk+FireEye by Splunk
Detection and Response with Splunk+FireEyeDetection and Response with Splunk+FireEye
Detection and Response with Splunk+FireEye
Splunk1.8K views
Ict conf td-evs_pcidss-final by Dejan Jeremic
Ict conf td-evs_pcidss-finalIct conf td-evs_pcidss-final
Ict conf td-evs_pcidss-final
Dejan Jeremic659 views
Tomorrow Starts Here - Security Everywhere by Cisco Canada
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
Cisco Canada2.3K views
FireEye Advanced Threat Protection - What You Need to Know by FireEye, Inc.
FireEye Advanced Threat Protection - What You Need to KnowFireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to Know
FireEye, Inc.3.5K views
Understanding Cyber Kill Chain and OODA loop by David Sweigert
Understanding Cyber Kill Chain and OODA loopUnderstanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loop
David Sweigert3.5K views
Overview of the Cyber Kill Chain [TM] by David Sweigert
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
David Sweigert3.5K views
Cyber Kill Chain vs. Cyber Criminals by David Sweigert
Cyber Kill Chain vs. Cyber CriminalsCyber Kill Chain vs. Cyber Criminals
Cyber Kill Chain vs. Cyber Criminals
David Sweigert366 views
Scalar Security Roadshow - Toronto Presentation by Scalar Decisions
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto Presentation
Scalar Decisions1.9K views

Similar to PROGRAMMING AND CYBER SECURITY

8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security by
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation SecurityBGA Cyber Security
2.8K views28 slides
Mobile Penetration Testing: Episode III - Attack of the Code by
Mobile Penetration Testing: Episode III - Attack of the CodeMobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the CodeNowSecure
1.2K views27 slides
Next Generation Security by
Next Generation SecurityNext Generation Security
Next Generation SecurityCisco Canada
2.5K views41 slides
Demystify Information Security & Threats for Data-Driven Platforms With Cheta... by
Demystify Information Security & Threats for Data-Driven Platforms With Cheta...Demystify Information Security & Threats for Data-Driven Platforms With Cheta...
Demystify Information Security & Threats for Data-Driven Platforms With Cheta...Chetan Khatri
300 views72 slides
Behind the Curtain: Exposing Advanced Threats by
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsCisco Canada
1.1K views46 slides
[Webinar] Why Security Certification is Crucial for IoT Success by
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT SuccessElectric Imp
1K views35 slides

Similar to PROGRAMMING AND CYBER SECURITY(20)

8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security by BGA Cyber Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
BGA Cyber Security2.8K views
Mobile Penetration Testing: Episode III - Attack of the Code by NowSecure
Mobile Penetration Testing: Episode III - Attack of the CodeMobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the Code
NowSecure1.2K views
Next Generation Security by Cisco Canada
Next Generation SecurityNext Generation Security
Next Generation Security
Cisco Canada2.5K views
Demystify Information Security & Threats for Data-Driven Platforms With Cheta... by Chetan Khatri
Demystify Information Security & Threats for Data-Driven Platforms With Cheta...Demystify Information Security & Threats for Data-Driven Platforms With Cheta...
Demystify Information Security & Threats for Data-Driven Platforms With Cheta...
Chetan Khatri300 views
Behind the Curtain: Exposing Advanced Threats by Cisco Canada
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced Threats
Cisco Canada1.1K views
[Webinar] Why Security Certification is Crucial for IoT Success by Electric Imp
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success
Electric Imp1K views
Splunk for Enterprise Security Featuring UBA by Splunk
Splunk for Enterprise Security Featuring UBASplunk for Enterprise Security Featuring UBA
Splunk for Enterprise Security Featuring UBA
Splunk2.1K views
New Era of Software with modern Application Security v1.0 by Dinis Cruz
New Era of Software with modern Application Security v1.0New Era of Software with modern Application Security v1.0
New Era of Software with modern Application Security v1.0
Dinis Cruz3.4K views
Web Application Testing for Today’s Biggest and Emerging Threats by Alan Kan
Web Application Testing for Today’s Biggest and Emerging ThreatsWeb Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging Threats
Alan Kan1.1K views
Cisco Security Architecture by Cisco Canada
Cisco Security ArchitectureCisco Security Architecture
Cisco Security Architecture
Cisco Canada15.9K views
Secure Application Development InfoShare 2022 by Radu Vunvulea
Secure Application Development InfoShare 2022Secure Application Development InfoShare 2022
Secure Application Development InfoShare 2022
Radu Vunvulea14 views
Security as a top of mind issue for mobile application development by Ștefan Popa
Security as a top of mind issue for mobile application developmentSecurity as a top of mind issue for mobile application development
Security as a top of mind issue for mobile application development
Ștefan Popa103 views
Security in the age of open source - Myths and misperceptions by Tim Mackey
Security in the age of open source - Myths and misperceptionsSecurity in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptions
Tim Mackey289 views
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla... by BGA Cyber Security
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA Cyber Security3.4K views
Securing a Cloud Migration by VMware Tanzu
Securing a Cloud MigrationSecuring a Cloud Migration
Securing a Cloud Migration
VMware Tanzu273 views
Scalar Security Roadshow - Vancouver Presentation by Scalar Decisions
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
Scalar Decisions1.2K views
Scalar Security Roadshow - Ottawa Presentation by Scalar Decisions
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
Scalar Decisions852 views

More from Sylvain Martinez

INTRODUCTION TO CRYPTOGRAPHY by
INTRODUCTION TO CRYPTOGRAPHYINTRODUCTION TO CRYPTOGRAPHY
INTRODUCTION TO CRYPTOGRAPHYSylvain Martinez
1.2K views21 slides
INCIDENT RESPONSE NIST IMPLEMENTATION by
INCIDENT RESPONSE NIST IMPLEMENTATIONINCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATIONSylvain Martinez
5.5K views27 slides
IOT Security by
IOT SecurityIOT Security
IOT SecuritySylvain Martinez
897 views27 slides
ARE YOU RED TEAM READY? by
ARE YOU RED TEAM READY?ARE YOU RED TEAM READY?
ARE YOU RED TEAM READY?Sylvain Martinez
255 views24 slides
GDPR SECURITY ISSUES by
GDPR SECURITY ISSUESGDPR SECURITY ISSUES
GDPR SECURITY ISSUESSylvain Martinez
180 views9 slides
Risk on Crypto Currencies by
Risk on Crypto CurrenciesRisk on Crypto Currencies
Risk on Crypto CurrenciesSylvain Martinez
663 views15 slides

More from Sylvain Martinez(13)

Recently uploaded

Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ by
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericConfidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericShapeBlue
58 views9 slides
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... by
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...Bernd Ruecker
50 views69 slides
NTGapps NTG LowCode Platform by
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform Mustafa Kuğu
287 views30 slides
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT by
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBITUpdates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBITShapeBlue
138 views8 slides
Digital Personal Data Protection (DPDP) Practical Approach For CISOs by
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
103 views59 slides
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P... by
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...ShapeBlue
120 views62 slides

Recently uploaded(20)

Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ by ShapeBlue
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericConfidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
ShapeBlue58 views
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... by Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker50 views
NTGapps NTG LowCode Platform by Mustafa Kuğu
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform
Mustafa Kuğu287 views
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT by ShapeBlue
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBITUpdates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
ShapeBlue138 views
Digital Personal Data Protection (DPDP) Practical Approach For CISOs by Priyanka Aash
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash103 views
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P... by ShapeBlue
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
ShapeBlue120 views
State of the Union - Rohit Yadav - Apache CloudStack by ShapeBlue
State of the Union - Rohit Yadav - Apache CloudStackState of the Union - Rohit Yadav - Apache CloudStack
State of the Union - Rohit Yadav - Apache CloudStack
ShapeBlue218 views
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue by ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlueCloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
ShapeBlue63 views
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates by ShapeBlue
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates
ShapeBlue178 views
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava... by ShapeBlue
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
ShapeBlue74 views
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... by TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc130 views
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti... by ShapeBlue
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
ShapeBlue69 views
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R... by ShapeBlue
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
ShapeBlue105 views
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online by ShapeBlue
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online
ShapeBlue154 views
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue by ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
ShapeBlue191 views
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... by ShapeBlue
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
ShapeBlue93 views
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... by ShapeBlue
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
ShapeBlue97 views
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ... by ShapeBlue
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
ShapeBlue121 views

PROGRAMMING AND CYBER SECURITY

  • 1. 1 1 1 0 0 1 0 1 0 0 0 0 1 1 0 1 1 0 0 0 0 1 1 1 1 0 0 1 0 1 1 1 0 1 0 1 1 0 1 1 1 0 1 0 1 1 0 0 1 0 1 1 0 0 1 0 1 1 0 1 1 1 1 0 1 0 1 0 1 0 0 1 0 1 0 1 1 0 1 0 1 0 1 1 1 1 1 1 0 0 1 0 0 1 0 1 0 0 1 1 1 0 0 0 1 0 1 0 1 0 0 1 1 1 1 1 1 1 0 1 1 0 1 0 1 1 1 1 1 1 1 0 1 0 0 0 1 1 0 0 1 1 1 0 0 1 1 0 0 1 0 1 1 0 1 1 1 0 0 0 1 0 1 0 1 1 0 1 0 1 1 1 1 0 1 0 1 1 1 0 0 1 0 1 0 0 1 1 1 0 1 0 PROGRAMMING AND CYBERSECURITY PYTHON MAURITIUS USER GROUP VERSION: 1.0.1 DATE: 30/09/2021 AUTHOR: SYLVAIN MARTINEZ REFERENCE: ES-CP-PACS REPORT ENGINE: 2.1.0 CLASSIFICATION: PUBLIC {elysiumsecurity} cyber protection & response
  • 2. DISCLAIMER This presentation and the Services methodology, frameworks and templates used in this document will remain the property of ES and must not be used or re-used without explicit consent from ES unless it is already available, or becomes available, in the public domain. {elysiumsecurity} cyber protection & response 2 PUBLIC
  • 3. CONCLUSION CASE STUDY WHAT LANGUAGES WHY PROGRAMMING CONTEXT {elysiumsecurity} cyber protection & response CONTENTS 3 PUBLIC GOAL WHO AM I? COMPANY BACKGROUND CYBER SECURITY RISK CONCEPT CYBER SECURITY JOB’S RELEVANCE AUTOMATION TOOLING REVERSE ENGINEERING EXPLOITS MANY LANGUAGES TO CHOOSE FROM MOST USEFUL LANGUAGES POPULAR SECURITY PROJECTS SECURED ANDROID APP O365 LOGS IP SOURCE BEWARE TAKE AWAY
  • 4. Icons: from The Noun Project unless stated otherwise GOAL 4 TO AVOID SOME COMMON MISTAKES 3 TO KNOW WHERE TO START 2 TO KNOW HOW PROGRAMMING CAN BE USED 1 TO UNDERSTAND THE IMPORTANCE OF PROGRAMMING IN CYBER SECURITY {elysiumsecurity} cyber protection & response PUBLIC CONCLUSION CASE STUDY WHAT LANGUAGES WHY PROGRAMMING CONTEXT
  • 5. WHO AM I? 5 {elysiumsecurity} cyber protection & response PUBLIC CONCLUSION CASE STUDY WHAT LANGUAGES WHY PROGRAMMING CONTEXT https://www.elysiumsecurity.com
  • 6. COMPANY BACKGROUND 6 {elysiumsecurity} cyber protection & response PUBLIC CONCLUSION CASE STUDY WHAT LANGUAGES WHY PROGRAMMING CONTEXT FOUNDED IN 2015 BY SYLVAIN MARTINEZ INCORPORATED IN MAURITUS/UK AND OPERATING WORLDWIDE PROVIDING INDEPENDENT EXPERTISE IN CYBER SECURITY COMPREHENSIVE CYBER SECURITY SERVICE PORTFOLIO: FROM CISO ADVISORY TO PENETRATION TESTING AND INCIDENT RESPONSE EXPOSURE TO A VARIETY OF BUSINESS SECTORS: FINANCE, TELECOMS, HEALTHCARE, HOTELS, MANUFACTORING, NAVAL, RETAIL, ETC. BOUTIQUE STYLE APPROACH WITH A DISCREET, TAILORED AND SPECIALIZED CYBER SECURITY SERVICE THAT FITS YOUR WORKING ENVIRONMENT
  • 7. CYBER SECURITY RISK CONTEXT {elysiumsecurity} cyber protection & response 7 PUBLIC CONCLUSION CASE STUDY WHAT LANGUAGES WHY PROGRAMMING CONTEXT PAST FUTURE 100% 0% TIME GROWTH PAST FUTURE 100% 0% TIME GROWTH PAST FUTURE 100% 0% TIME GROWTH CYBER SECURITY RISKS’ PROBABILITY AND IMPACT ARE INCREASING. THEIR ABILITY TO DISRUPT COMPANIES BUSINESS OPERATION HAVE GROWING FINANCIAL, REPUTATIONAL AND LEGAL NEGATIVE CONSEQUENCES + =
  • 8. CYBER SECURITY JOB’S RELEVANCE {elysiumsecurity} cyber protection & response 8 PUBLIC CONCLUSION CASE STUDY WHAT LANGUAGES WHY PROGRAMMING CONTEXT PROGRAMMING KNOWLEDGE BENEFITS MOST MANAGEMENT ROLE MOST ADVISORY ROLE ALL TECHNICAL ROLE How much could knowledge of programming help you be better at your job? ALL MANAGEMENT ROLE ALL ADVISORY ROLE ALL TECHNICAL ROLE PERCEPTION REALITY
  • 9. AUTOMATION {elysiumsecurity} cyber protection & response 9 PUBLIC CONCLUSION CASE STUDY WHAT LANGUAGES WHY PROGRAMMING CONTEXT REPETITIVE TASKS EFFICIENCY SAVE TIME REGEX SEARCH FILTERING PROCESS LARGE VOLUME OF DATA EXTRACT PATTERNS FIND NEEDLE
  • 10. TOOLING {elysiumsecurity} cyber protection & response 10 PUBLIC CONCLUSION CASE STUDY WHAT LANGUAGES WHY PROGRAMMING CONTEXT TOOLS CREATION EFFICIENCY CAPABILITY TOOLS CUSTOMISATION ADAPT AND REUSE
  • 11. REVERSE ENGINEERING {elysiumsecurity} cyber protection & response 11 PUBLIC CONCLUSION CASE STUDY WHAT LANGUAGES WHY PROGRAMMING CONTEXT MALWARE KNOWLEDGE UNDERSTANDING APP ASSESSMENT SUSPICIOUS APP CONTROLS BYPASS
  • 12. EXPLOITS {elysiumsecurity} cyber protection & response 12 PUBLIC CONCLUSION CASE STUDY WHAT LANGUAGES WHY PROGRAMMING CONTEXT VULNERABILITY ASSESSMENT ACCURACY PENETRATION TESTING INCREASED ATTACK SURFACE
  • 13. MANY LANGUAGES TO CHOOSE FROM {elysiumsecurity} cyber protection & response 13 PUBLIC CONCLUSION CASE STUDY WHAT LANGUAGES WHY PROGRAMMING CONTEXT images from exploring-data.com and graphext.com LANGUAGES RELATIONSHIPS MOST USED LANGUAGES
  • 14. MOST USEFUL LANGUAGES {elysiumsecurity} cyber protection & response 14 PUBLIC CONCLUSION CASE STUDY WHAT LANGUAGES WHY PROGRAMMING CONTEXT ANY LANGUAGE IS GOOD! MOST COMMONLY USED LANGUAGES IN CYBER SECURITY PYTHON C/C++ PHP JAVA PERL SHELL SCRIPTS ONCE YOU UNDERSTAND THE CORE PROGRAMMING CONCEPTS YOU CAN UNDERSTAND AND CHANGE ALMOST ANY CODE HTML ASM? RUBY
  • 15. POPULAR CYBER SECURITY PROJECTS EXAMPLES {elysiumsecurity} cyber protection & response 15 PUBLIC CONCLUSION CASE STUDY WHAT LANGUAGES WHY PROGRAMMING CONTEXT POPULAR SECURITY TOOL PURPOSE LANGUAGE BANDIT Python code analyser PYTHON BURP SUITE Web traffic manipulation JAVA HAWKEYE VA Scanner PYTHON MALTEGO Data Visualisation JAVA METASPLOIT VAPT Framework RUBY NIKTO Web scanner PERL NMAP Network scanner C/PYTHON/LUA OPENVAS VA Scanner C RECON-NG OSINT Search PYTHON SATAN (very) old linux scanner PERL SCAPY Network manipulation PYTHON SQLMAP DB Scanner PYTHON WIRESHARK Network analyser C
  • 16. SECURED ANDROID APP NEEDS TO BE TESTED {elysiumsecurity} cyber protection & response 16 PUBLIC CONCLUSION CASE STUDY WHAT LANGUAGES WHY PROGRAMMING CONTEXT CHALLENGE • Need to audit an Android APK app • App does not allow “Routing” and has “Cert pinning” PROGRAMMING SOLUTION • Decompile the code to Java (i.e.: d2j-dex2jar) • Analyse the Java code for security hooks (i.e.: jd-gui) • Decompile the code to SMALI (i.e.: apktool) • Edit the SMALI code to remove the protection (assembly) • Recompile and sign the code • Execute the non-secured code and manually check for issues NON-PROGRAMMING SOLUTION • Use the great MobSF framework to get some automated analysis • Give up / ask for a non-secure version
  • 17. SECURED ANDROID APP NEEDS TO BE TESTED {elysiumsecurity} cyber protection & response 17 PUBLIC CONCLUSION CASE STUDY WHAT LANGUAGES WHY PROGRAMMING CONTEXT JAVA SHELL SCRIPTS ASSEMBLY/SMALI + SHELL SCRIPTS
  • 18. O365 LOGS IP SOURCE IDENTIFICATION {elysiumsecurity} cyber protection & response 18 PUBLIC CONCLUSION CASE STUDY WHAT LANGUAGES WHY PROGRAMMING CONTEXT CHALLENGE • O365 Audit logs list of IP • Identify suspicious IP PROGRAMMING SOLUTION • Export logs as csv • Format csv to extract list of IP • Use IP country mapping API • add countries against each IP • Easily filter with countries of interest NON-PROGRAMMING SOLUTION • Manual IP extraction and resolution • or Pay for extra security add-ons: Risky-sign on, conditional logins, etc
  • 19. O365 LOGS IP SOURCE IDENTIFICATION {elysiumsecurity} cyber protection & response 19 PUBLIC CONCLUSION CASE STUDY WHAT LANGUAGES WHY PROGRAMMING CONTEXT (POWER) SHELL SCRIPT
  • 20. BEWARE {elysiumsecurity} cyber protection & response 20 PUBLIC CONCLUSION CASE STUDY WHAT LANGUAGES WHY PROGRAMMING CONTEXT Wasting time on non essential activities Reinventing a “broken” and less “efficient” wheel i.e.: crypto answer: ”Hello” Customization may lead to medium/long terms support issues
  • 21. TAKE AWAY {elysiumsecurity} cyber protection & response 21 PUBLIC CONCLUSION CASE STUDY WHAT LANGUAGES WHY PROGRAMMING CONTEXT
  • 22. GOING FURTHER {elysiumsecurity} cyber protection & response 22 PUBLIC CONCLUSION CASE STUDY WHAT LANGUAGES WHY PROGRAMMING CONTEXT • https://flatironschool.com/blog/best-programming-languages-cyber- security • https://www.sans.org/cyber-security-courses/automating- information-security-with-python/ • A lot of free resources online, google “free python hacking course”
  • 23. © 2015-2021 ELYSIUMSECURITY LTD ALL RIGHTS RESERVED HTTPS://WWW.ELYSIUMSECURITY.COM CONSULTING@ELYSIUMSECURITY.COM ABOUT ELYSIUMSECURITY LTD. {elysiumsecurity} cyber protection & response ELYSIUMSECURITY PROVIDES A PORTFOLIO OF STRATEGIC AND TACTICAL SERVICES TO HELP COMPANIES PROTECT AND RESPOND AGAINST CYBER SECURITY THREATS. WE DIFFERENTIATE OURSELVES BY OFFERING DISCREET, TAILORED AND SPECIALIZED ENGAGEMENTS. ELYSIUMSECURITY OPERATES IN MAURITIUS AND IN EUROPE, A BOUTIQUE STYLE APPROACH MEANS WE CAN EASILY ADAPT TO YOUR BUSINESS OPERATIONAL MODEL AND REQUIREMENTS TO PROVIDE A PERSONALIZED SERVICE THAT FITS YOUR WORKING ENVIRONMENT. ELYSIUMSECURITY PROVIDES PRACTICAL EXPERTISE TO IDENTIFY VULNERABILITIES, ASSESS THEIR RISKS AND IMPACT, REMEDIATE THOSE RISKS, PREPARE AND RESPOND TO INCIDENTS AS WELL AS RAISE SECURITY AWARENESS THROUGH AN ORGANIZATION. ELYSIUMSECURITY PROVIDES HIGH LEVEL EXPERTISE GATHERED THROUGH YEARS OF BEST PRACTICES EXPERIENCE IN LARGE INTERNATIONAL COMPANIES ALLOWING US TO PROVIDE ADVICE BEST SUITED TO YOUR BUSINESS OPERATIONAL MODEL AND PRIORITIES.