SlideShare a Scribd company logo
1 of 28
#expoQA19
#expoQA19
Security Awareness “The Hackers Eyes”
Steven Nienhuis
https://www.slideshare.net/steavy
#expoQA19
Agenda
1. Goal of this presentation
2. Steps for a succesful hack (part 1)
3. Nowadays security threats by WiFi connections
4. Steps for a succesful hack (part 2)
5. Security inside Agile Teams
6. Questions
#expoQA19Steps for a succesful hack
1. Reconnaissance
Reconnaissance
#expoQA19Steps for a succesful hack
1. Reconnaissance
2. Scanning Reconnaissance
Scanning
#expoQA19Steps for a succesful hack
1. Reconnaissance
2. Scanning
3. Gaining Access
Reconnaissance
Scanning
Gaining Access
#expoQA19Steps for a succesful hack
1. Reconnaissance
2. Scanning
3. Gaining Access
4. Maintaining Access
Reconnaissance
Scanning
Gaining Access
Maintaining Access
#expoQA19Steps for a succesful hack
1. Reconnaissance
2. Scanning
3. Gaining Access
4. Maintaining Access
5. Clearing Tracks
Reconnaissance
Scanning
Gaining Access
Maintaining Access
Clearing Tracks
#expoQA19Security threats by WiFi connections
Open WiFi network to join:
FreeWifiExpoQA19
#expoQA19
#expoQA19Security threats by WiFi connections
#expoQA19Steps for a succesful hack
#expoQA19Steps for a succesful hack
#expoQA19Steps for a succesful hack
#expoQA19Security priority inside Agile Teams
1. Focus on non-functional requirements during refinement sessions
#expoQA19Security priority inside Agile Teams
1. Focus on non-functional requirements during refinement sessions
#expoQA19Security priority inside Agile Teams
1. Focus on non-functional requirements during refinement sessions
#expoQA19Security priority inside Agile Teams
1. Focus on non-functional requirements during refinement sessions
2. Knowledge of security aspects inside Agile Teams
#expoQA19Security priority inside Agile Teams
1. Focus on non-functional requirements during refinement sessions
2. Knowledge of security aspects inside Agile Teams
3. The extra role for a Tester inside Agile Teams
#expoQA19Security priority inside Agile Teams
1. Focus on non-functional requirements during refinement sessions
2. Knowledge of security aspects inside Agile Teams
3. The extra role for a Tester inside Agile Teams
#expoQA19Security priority inside Agile Teams
1. Focus on non-functional requirements during refinement sessions
2. Knowledge of security aspects inside Agile Teams
3. The extra role for a Tester inside Agile Teams
4. Tooling and heuristics to use
#expoQA19Security priority inside Agile Teams
1. Focus on non-functional requirements during refinement sessions
2. Knowledge of security aspects inside Agile Teams
3. The extra role for a Tester inside Agile Teams
4. Tooling and heuristics to use
#expoQA19Security priority inside Agile Teams
1. Focus on non-functional requirements during refinement sessions
2. Knowledge of security aspects inside Agile Teams
3. The extra role for a Tester inside Agile Teams
4. Tooling and heuristics to use
*https://github.com/danielbilling/security-test-learning
#expoQA19Security priority inside Agile Teams
1. Focus on non-functional requirements during refinement sessions
2. Knowledge of security aspects inside Agile Teams
3. The extra role for a Tester inside Agile Teams
4. Tooling and heuristics to use
5. Security as a Acceptance Criteria or by Design
#expoQA19Security priority inside Agile Teams
1. Focus on non-functional requirements during refinement sessions
2. Knowledge of security aspects inside Agile Teams
3. The extra role for a Tester inside Agile Teams
4. Tooling and heuristics to use
5. Security as a Acceptance Criteria or by Design
6. Security trainings
#expoQA19
#expoQA19
Top tip
• OWASP checklist - https://www.owasp.org/index.php/Top_10-2017_Top_10
Advanced
• Burpsuite - https://portswigger.net/burp
• OWASP Zed Attack Proxy - https://www.zaproxy.org/
#expoQA19

More Related Content

Similar to ExpoQA19 slides security awareness Steven Nienhuis

Central Ohio InfoSec Summit: Why Script Kiddies Succeed
Central Ohio InfoSec Summit: Why Script Kiddies SucceedCentral Ohio InfoSec Summit: Why Script Kiddies Succeed
Central Ohio InfoSec Summit: Why Script Kiddies Succeed
ThreatReel Podcast
 

Similar to ExpoQA19 slides security awareness Steven Nienhuis (20)

#ATAGTR2018 Presentation "Decoding Security in DevSecOps" by Meghashyam Varan...
#ATAGTR2018 Presentation "Decoding Security in DevSecOps" by Meghashyam Varan...#ATAGTR2018 Presentation "Decoding Security in DevSecOps" by Meghashyam Varan...
#ATAGTR2018 Presentation "Decoding Security in DevSecOps" by Meghashyam Varan...
 
Security Champions - Introduce them in your Organisation
Security Champions - Introduce them in your OrganisationSecurity Champions - Introduce them in your Organisation
Security Champions - Introduce them in your Organisation
 
DevSecOps for Developers, How To Start (ETC 2020)
DevSecOps for Developers, How To Start (ETC 2020)DevSecOps for Developers, How To Start (ETC 2020)
DevSecOps for Developers, How To Start (ETC 2020)
 
Agile Secure Development
Agile Secure DevelopmentAgile Secure Development
Agile Secure Development
 
A New Security Management Approach for Agile Environments
A New Security Management Approach for Agile EnvironmentsA New Security Management Approach for Agile Environments
A New Security Management Approach for Agile Environments
 
Making Security Agile
Making Security AgileMaking Security Agile
Making Security Agile
 
Defcon Blue Team Village 2020: Purple On My Mind: Cost Effective Automated Ad...
Defcon Blue Team Village 2020: Purple On My Mind: Cost Effective Automated Ad...Defcon Blue Team Village 2020: Purple On My Mind: Cost Effective Automated Ad...
Defcon Blue Team Village 2020: Purple On My Mind: Cost Effective Automated Ad...
 
Ethical Hacking Conference 2015- Building Secure Products -a perspective
 Ethical Hacking Conference 2015- Building Secure Products -a perspective Ethical Hacking Conference 2015- Building Secure Products -a perspective
Ethical Hacking Conference 2015- Building Secure Products -a perspective
 
Kim van Wilgen - Continuous security - Codemotion Amsterdam 2019
Kim van Wilgen - Continuous security - Codemotion Amsterdam 2019Kim van Wilgen - Continuous security - Codemotion Amsterdam 2019
Kim van Wilgen - Continuous security - Codemotion Amsterdam 2019
 
2020 FRSecure CISSP Mentor Program - Class 10
2020 FRSecure CISSP Mentor Program - Class 102020 FRSecure CISSP Mentor Program - Class 10
2020 FRSecure CISSP Mentor Program - Class 10
 
Central Ohio InfoSec Summit: Why Script Kiddies Succeed
Central Ohio InfoSec Summit: Why Script Kiddies SucceedCentral Ohio InfoSec Summit: Why Script Kiddies Succeed
Central Ohio InfoSec Summit: Why Script Kiddies Succeed
 
Agile security
Agile securityAgile security
Agile security
 
Building a Modern Security Engineering Organization
Building a Modern Security Engineering OrganizationBuilding a Modern Security Engineering Organization
Building a Modern Security Engineering Organization
 
Seacon Continuous Delivery Pipeline Tools Track
Seacon Continuous Delivery Pipeline Tools TrackSeacon Continuous Delivery Pipeline Tools Track
Seacon Continuous Delivery Pipeline Tools Track
 
How GitLab and HackerOne help organizations innovate faster without compromis...
How GitLab and HackerOne help organizations innovate faster without compromis...How GitLab and HackerOne help organizations innovate faster without compromis...
How GitLab and HackerOne help organizations innovate faster without compromis...
 
Sandboxing in .NET CLR
Sandboxing in .NET CLRSandboxing in .NET CLR
Sandboxing in .NET CLR
 
Application security testing in the age of Agile development - by Julio Cesar...
Application security testing in the age of Agile development - by Julio Cesar...Application security testing in the age of Agile development - by Julio Cesar...
Application security testing in the age of Agile development - by Julio Cesar...
 
J2EE Security with Apache SHIRO
J2EE Security with Apache SHIROJ2EE Security with Apache SHIRO
J2EE Security with Apache SHIRO
 
Kim van Wilgen - Continuous security - Codemotion Rome 2019
Kim van Wilgen - Continuous security - Codemotion Rome 2019Kim van Wilgen - Continuous security - Codemotion Rome 2019
Kim van Wilgen - Continuous security - Codemotion Rome 2019
 
Year Zero
Year ZeroYear Zero
Year Zero
 

Recently uploaded

Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
Kayode Fayemi
 
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
ZurliaSoop
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
David Celestin
 

Recently uploaded (20)

BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptxBEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
Introduction to Artificial intelligence.
Introduction to Artificial intelligence.Introduction to Artificial intelligence.
Introduction to Artificial intelligence.
 
Call Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. Mumbai
Call Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. MumbaiCall Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. Mumbai
Call Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. Mumbai
 
"I hear you": Moving beyond empathy in UXR
"I hear you": Moving beyond empathy in UXR"I hear you": Moving beyond empathy in UXR
"I hear you": Moving beyond empathy in UXR
 
ECOLOGY OF FISHES.pptx full presentation
ECOLOGY OF FISHES.pptx full presentationECOLOGY OF FISHES.pptx full presentation
ECOLOGY OF FISHES.pptx full presentation
 
History of Morena Moshoeshoe birth death
History of Morena Moshoeshoe birth deathHistory of Morena Moshoeshoe birth death
History of Morena Moshoeshoe birth death
 
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
 
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
Ready Set Go Children Sermon about Mark 16:15-20
Ready Set Go Children Sermon about Mark 16:15-20Ready Set Go Children Sermon about Mark 16:15-20
Ready Set Go Children Sermon about Mark 16:15-20
 
Using AI to boost productivity for developers
Using AI to boost productivity for developersUsing AI to boost productivity for developers
Using AI to boost productivity for developers
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
 
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINESBIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
 
Abortion Pills Fahaheel ௹+918133066128💬@ Safe and Effective Mifepristion and ...
Abortion Pills Fahaheel ௹+918133066128💬@ Safe and Effective Mifepristion and ...Abortion Pills Fahaheel ௹+918133066128💬@ Safe and Effective Mifepristion and ...
Abortion Pills Fahaheel ௹+918133066128💬@ Safe and Effective Mifepristion and ...
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait Cityin kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORNLITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
 

ExpoQA19 slides security awareness Steven Nienhuis

  • 2. #expoQA19 Security Awareness “The Hackers Eyes” Steven Nienhuis https://www.slideshare.net/steavy
  • 3. #expoQA19 Agenda 1. Goal of this presentation 2. Steps for a succesful hack (part 1) 3. Nowadays security threats by WiFi connections 4. Steps for a succesful hack (part 2) 5. Security inside Agile Teams 6. Questions
  • 4. #expoQA19Steps for a succesful hack 1. Reconnaissance Reconnaissance
  • 5. #expoQA19Steps for a succesful hack 1. Reconnaissance 2. Scanning Reconnaissance Scanning
  • 6. #expoQA19Steps for a succesful hack 1. Reconnaissance 2. Scanning 3. Gaining Access Reconnaissance Scanning Gaining Access
  • 7. #expoQA19Steps for a succesful hack 1. Reconnaissance 2. Scanning 3. Gaining Access 4. Maintaining Access Reconnaissance Scanning Gaining Access Maintaining Access
  • 8. #expoQA19Steps for a succesful hack 1. Reconnaissance 2. Scanning 3. Gaining Access 4. Maintaining Access 5. Clearing Tracks Reconnaissance Scanning Gaining Access Maintaining Access Clearing Tracks
  • 9. #expoQA19Security threats by WiFi connections Open WiFi network to join: FreeWifiExpoQA19
  • 11. #expoQA19Security threats by WiFi connections
  • 12. #expoQA19Steps for a succesful hack
  • 13. #expoQA19Steps for a succesful hack
  • 14. #expoQA19Steps for a succesful hack
  • 15. #expoQA19Security priority inside Agile Teams 1. Focus on non-functional requirements during refinement sessions
  • 16. #expoQA19Security priority inside Agile Teams 1. Focus on non-functional requirements during refinement sessions
  • 17. #expoQA19Security priority inside Agile Teams 1. Focus on non-functional requirements during refinement sessions
  • 18. #expoQA19Security priority inside Agile Teams 1. Focus on non-functional requirements during refinement sessions 2. Knowledge of security aspects inside Agile Teams
  • 19. #expoQA19Security priority inside Agile Teams 1. Focus on non-functional requirements during refinement sessions 2. Knowledge of security aspects inside Agile Teams 3. The extra role for a Tester inside Agile Teams
  • 20. #expoQA19Security priority inside Agile Teams 1. Focus on non-functional requirements during refinement sessions 2. Knowledge of security aspects inside Agile Teams 3. The extra role for a Tester inside Agile Teams
  • 21. #expoQA19Security priority inside Agile Teams 1. Focus on non-functional requirements during refinement sessions 2. Knowledge of security aspects inside Agile Teams 3. The extra role for a Tester inside Agile Teams 4. Tooling and heuristics to use
  • 22. #expoQA19Security priority inside Agile Teams 1. Focus on non-functional requirements during refinement sessions 2. Knowledge of security aspects inside Agile Teams 3. The extra role for a Tester inside Agile Teams 4. Tooling and heuristics to use
  • 23. #expoQA19Security priority inside Agile Teams 1. Focus on non-functional requirements during refinement sessions 2. Knowledge of security aspects inside Agile Teams 3. The extra role for a Tester inside Agile Teams 4. Tooling and heuristics to use *https://github.com/danielbilling/security-test-learning
  • 24. #expoQA19Security priority inside Agile Teams 1. Focus on non-functional requirements during refinement sessions 2. Knowledge of security aspects inside Agile Teams 3. The extra role for a Tester inside Agile Teams 4. Tooling and heuristics to use 5. Security as a Acceptance Criteria or by Design
  • 25. #expoQA19Security priority inside Agile Teams 1. Focus on non-functional requirements during refinement sessions 2. Knowledge of security aspects inside Agile Teams 3. The extra role for a Tester inside Agile Teams 4. Tooling and heuristics to use 5. Security as a Acceptance Criteria or by Design 6. Security trainings
  • 27. #expoQA19 Top tip • OWASP checklist - https://www.owasp.org/index.php/Top_10-2017_Top_10 Advanced • Burpsuite - https://portswigger.net/burp • OWASP Zed Attack Proxy - https://www.zaproxy.org/

Editor's Notes

  1. This is the first step of Hacking. It is also called as Footprinting and information gathering  Phase. This is the preparatory phase where we collect as much information as possible about the target. We usually collect information about three groups,  Network Host People involved There are two types of Footprinting: Active: Directly interacting with the target to gather information about the target. Eg Using Nmap tool to scan the target Passive: Trying to collect the information about the target without directly accessing the target. This involves collecting information from social media, public websites etc.
  2. Three types of scanning are involved: Port scanning: This phase involves scanning the target for the information like open ports, Live systems, various services running on the host. Vulnerability Scanning: Checking the target for weaknesses or vulnerabilities which can be exploited. Usually done with help of automated tools Network Mapping: Finding the topology of network, routers, firewalls servers if any, and host information and drawing a network diagram with the available information. This map may serve as a valuable piece of information throughout the haking process.
  3. This phase is where an attacker breaks into the system/network using various tools or methods. After entering into a system, he has to increase his privilege to administrator level so he can install an application he needs or modify data or hide data.
  4. Hacker may just hack the system to show it was vulnerable or he can be so mischievous that he wants to maintain or persist the connection in the background without the knowledge of the user. This can be done using Trojans, Rootkits or other malicious files. The aim is to maintain the access to the target until he finishes the tasks he planned to accomplish in that target.
  5. No thief wants to get caught. An intelligent hacker always clears all evidence so that in the later point of time, no one will find any traces leading to him. This involves modifying/corrupting/deleting the values of Logs, modifying registry values and uninstalling all applications he used and deleting all folders he created.