Offensive Security

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 195 Experts worldwide ranked by ideXlab platform

David Starobinski - One of the best experts on this subject based on the ideXlab platform.

  • a simple laboratory environment for real world Offensive Security education
    Technical Symposium on Computer Science Education, 2015
    Co-Authors: Maxim Timchenko, David Starobinski
    Abstract:

    In recent years cyberSecurity has gained prominence as a field of expertise and the relevant practical skills are in high demand. To reduce the cost and amount of dedicated hardware required to set up a cyberSecurity lab to teach those skills, several virtualization and outsourcing approaches were developed but the resulting setup has often increased in total complexity, hampering adoption. In this paper we present a very simple (and therefore highly scalable) setup that incorporates state-of-the-art industry tools. We also describe a structured set of lab assignments developed for this setup that build one on top of the other to cover the material of a semester-long CyberSecurity course taught at Boston University. We explore alternative lab architectures, discuss other existing sets of lab assignments and present some ideas for further improvement.

  • SIGCSE - A Simple Laboratory Environment for Real-World Offensive Security Education
    Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015
    Co-Authors: Maxim Timchenko, David Starobinski
    Abstract:

    In recent years cyberSecurity has gained prominence as a field of expertise and the relevant practical skills are in high demand. To reduce the cost and amount of dedicated hardware required to set up a cyberSecurity lab to teach those skills, several virtualization and outsourcing approaches were developed but the resulting setup has often increased in total complexity, hampering adoption. In this paper we present a very simple (and therefore highly scalable) setup that incorporates state-of-the-art industry tools. We also describe a structured set of lab assignments developed for this setup that build one on top of the other to cover the material of a semester-long CyberSecurity course taught at Boston University. We explore alternative lab architectures, discuss other existing sets of lab assignments and present some ideas for further improvement.

Kai K. Kimppa - One of the best experts on this subject based on the ideXlab platform.

  • Updating the Wassenaar Debate Once Again: Surveillance, Intrusion Software, and Ambiguity
    Journal of Information Technology & Politics, 2019
    Co-Authors: Jukka Ruohonen, Kai K. Kimppa
    Abstract:

    This paper analyzes a recent debate on regulating cyber weapons through multilateral export controls. The background relates to the amending of the international Wassenaar Arrangement with Offensive cyber Security technologies known as intrusion software. Implicitly, such software is related to previously unregulated software vulnerabilities and exploits, which also make the ongoing debate particularly relevant. By placing the debate into a historical context, the paper reveals interesting historical parallels, elaborates the political background, and underlines many ambiguity problems related to rigorous definitions for cyber weapons. Many difficult problems remaining for framing Offensive Security tools with multilateral export controls are also pointed out.

Maxim Timchenko - One of the best experts on this subject based on the ideXlab platform.

  • a simple laboratory environment for real world Offensive Security education
    Technical Symposium on Computer Science Education, 2015
    Co-Authors: Maxim Timchenko, David Starobinski
    Abstract:

    In recent years cyberSecurity has gained prominence as a field of expertise and the relevant practical skills are in high demand. To reduce the cost and amount of dedicated hardware required to set up a cyberSecurity lab to teach those skills, several virtualization and outsourcing approaches were developed but the resulting setup has often increased in total complexity, hampering adoption. In this paper we present a very simple (and therefore highly scalable) setup that incorporates state-of-the-art industry tools. We also describe a structured set of lab assignments developed for this setup that build one on top of the other to cover the material of a semester-long CyberSecurity course taught at Boston University. We explore alternative lab architectures, discuss other existing sets of lab assignments and present some ideas for further improvement.

  • SIGCSE - A Simple Laboratory Environment for Real-World Offensive Security Education
    Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015
    Co-Authors: Maxim Timchenko, David Starobinski
    Abstract:

    In recent years cyberSecurity has gained prominence as a field of expertise and the relevant practical skills are in high demand. To reduce the cost and amount of dedicated hardware required to set up a cyberSecurity lab to teach those skills, several virtualization and outsourcing approaches were developed but the resulting setup has often increased in total complexity, hampering adoption. In this paper we present a very simple (and therefore highly scalable) setup that incorporates state-of-the-art industry tools. We also describe a structured set of lab assignments developed for this setup that build one on top of the other to cover the material of a semester-long CyberSecurity course taught at Boston University. We explore alternative lab architectures, discuss other existing sets of lab assignments and present some ideas for further improvement.

Jukka Ruohonen - One of the best experts on this subject based on the ideXlab platform.

  • Updating the Wassenaar Debate Once Again: Surveillance, Intrusion Software, and Ambiguity
    Journal of Information Technology & Politics, 2019
    Co-Authors: Jukka Ruohonen, Kai K. Kimppa
    Abstract:

    This paper analyzes a recent debate on regulating cyber weapons through multilateral export controls. The background relates to the amending of the international Wassenaar Arrangement with Offensive cyber Security technologies known as intrusion software. Implicitly, such software is related to previously unregulated software vulnerabilities and exploits, which also make the ongoing debate particularly relevant. By placing the debate into a historical context, the paper reveals interesting historical parallels, elaborates the political background, and underlines many ambiguity problems related to rigorous definitions for cyber weapons. Many difficult problems remaining for framing Offensive Security tools with multilateral export controls are also pointed out.

Jacob G. Oakley - One of the best experts on this subject based on the ideXlab platform.

  • Evaluating Offensive Security Processes
    Professional Red Teaming, 2019
    Co-Authors: Jacob G. Oakley
    Abstract:

    This and the following chapters show the challenge and value in evaluating Offensive Security technologies in a defensible and meaningful way. The following example focuses on experimental evaluation of the CAPTR team concept that was used in the academic arena. However, the framework created to perform this experimental evaluation can be used in both academia and industry, providing a repeatable and structured process to compare one Offensive Security method to another.

  • The State of Modern Offensive Security
    Professional Red Teaming, 2019
    Co-Authors: Jacob G. Oakley
    Abstract:

    The benefits of implementing red teams or similar services in an organization by using ethical hackers has been belabored. It is important at this point to turn to a discussion of the current challenges and obstacles in regard to fielding a successful Offensive Security capability. The issues in this industry are innumerable; however, I have found that the most pervasive ones are related to a handful of specific areas. Red teams are essentially in an unwinnable race with the adversary they are attempting to emulate. Standards surrounding the Offensive Security industry are often misrepresentative or prohibitive of adequate assessment. The customer–client relationship is, by definition, adversarial as a result of the nature of services being provided—a fact that can manifest itself into real issues for the assessors and the customers. Assuming all these assessment-related constraints can be addressed, there is still the personnel issues related to staffing a successful red team. This chapter covers the state of modern Offensive Security offerings as it pertains to these challenges.

  • Counter-APT Red Teaming
    Professional Red Teaming, 2019
    Co-Authors: Jacob G. Oakley
    Abstract:

    The concept of counter-APT red teaming (CAPTR teaming) is a method of reverse red teaming I theorized, designed, and evaluated during my doctoral research and in my dissertation. As mentioned in earlier chapters, a red team is at a huge disadvantage when it comes to emulating appropriately, and thus aptly mitigating, an advanced persistent threat. When it comes to red team engagements, APTs specifically represent a replication challenge for even the most talented Offensive Security professionals. Even when the skills of an ethical hacker and a malicious one are on an even playing field, the modern state of Offensive Security tilts almost every aspect in favor of the actual attacker verse the emulated one. The end result of attempting to address this issue was an Offensive Security assessment methodology that, although motivated by the APT challenge, was beneficial in many ways compared to traditional red teaming.

  • Red Teams in Cyberspace
    Professional Red Teaming, 2019
    Co-Authors: Jacob G. Oakley
    Abstract:

    There exists a mountain of discourse in both digital and print form that discusses new exploits or tools that aid in the compromise of information systems. These texts are valuable implements to be used by Offensive Security practitioners in carrying out their profession. There are certainly hallmark publications that contribute to the craft of ethical hacking; however, many and most are timely in nature. In fact, much of the reason for the largess of this body of work is that each day there is new code written or tools developed and new vulnerabilities and exploits to leverage that can obsolete previous works.

  • Rules of Engagement
    Professional Red Teaming, 2019
    Co-Authors: Jacob G. Oakley
    Abstract:

    The rules of engagement, or ROE, dictate the “how” involved in accomplishing assessment of what was defined in the scope after the shaping phase is complete. The legitimacy and legality of all actions the red team takes while conducting the assessment are ratified by the ROE. A well-established and agreed-to ROE document must be acknowledged and signed by both customer and providing parties. If not, the Offensive Security engagement by ethical hackers is considered in violation of the Computer Fraud and Abuse Act (CFAA), which constitutes a federal crime in the United States; in other countries, similarly prosecutable laws exist. That being said, this chapter is neither a complete representation of all facets of an ROE a particular test should include nor is it meant to define comprehensively the legal requirements of such a document. Drafting an ROE should involve legal advice as an imperative, and any customer organization agreeing to an ROE should also involve legal consultation prior to signing it.