THREATCARE
Open Source Defense
Building a Security Program with
Zero Budget
Agenda
•Budget challenges beyond CapEx/OpEx
•Foundations: The big picture and where to start
•Specific free & open-source tools to help at each step
•Real-World Experiences and Fun Stories*
*Randomly dispersed throughout
whoami – Kyle Bubp
• Just a dude trying to make things better.
Security: What’s the “True Cost”?
• Security = People + Processes + Products
People
• Salary
• Training
• Personal Dev
• Management
Processes
• Plan (policy)
• Build (tech)
• Test
• Improvement
Products
• CapEx/OpEx
• Support
• Time to Value
• Labor:Value
Why FOSS?
Not just for people with budget constraints!
It’s about time and control.
Commercial
1. Google search
2. Choose three
3. Contact vendors
4. Proof of concept
5. Wine & dine
6. Procurement
7. Implementation
Elapsed time: weeks/months
FOSS
1. Google search
2. Download
3. Configure
Elapsed time: minutes/hours
Why FOSS?
Shelfware
Products that are purchased, but never get used or never
fully achieve their intended value
What ends up on the Shelf?
What would get them off the shelf?
Start with a
solid
foundation.
Foundational Blueprints and Frameworks
•NIST Standards and Frameworks
•CIS Critical Security Controls
•ISO 27000
•MITRE ATT&CK
Blue Teaming on a Budget of Zero
Document everything!
A core documentation repository is critical
•Policy, procedure, how-tos, etc:
• MediaWiki
• Atlassian Confluence ($10 for up to 10 users)
•Incident Response Ticketing/Documentation:
• RTIR (https://bestpractical.com/download-page)
• The Hive (https://thehive-project.org/)
Build from the ground up
1. Identify
2. Protect and Harden
3. Detect
4. Respond
5. Recover
Blue Teaming on a Budget of Zero
The Asset Discovery Dilemma
Active Scanning? Nmap? Vuln Scanner? No. Ask your network!
NetDB https://netdbtracking.sourceforge.net/
.ova available at https://www.kylebubp.com/files/netdb.ova
Other network mapping approaches
•nmap + ndiff/yandiff
• Not just for red teams.
• Export results, diff for changes.
• Alert if something changed.
•Netdisco
• https://sourceforge.net/projects/netdisco
• Uses SNMP to inventory your network devices
Data Discovery
•Users are good at putting sensitive data on the network.
•Find it with OpenDLP
OpenVAS
•Fork of Nessus
•Still maintained
•Default vuln scanner in AlienVault
•Does a great job in comparison w/ commercial products
Web Apps too!
•Arachni Framework (arachni-scanner.com)
•OWASP ZAP (Zed Attack Proxy)
•Nikto2 (more of a server config scanner)
•Portswigger Burp Suite (not free - $350)
•For a comparison – sectoolmarket.com
In addition to fixing vulnerabilities…
•Build in some additional security on your web servers.
(also part of a secure configuration)
•Fail2ban
Python-based IPS that runs off of Apache Logs
•Modsecurity
Open source WAF for Apache, IIS, & nginx
Build from the ground up
1. Identify
2. Protect and Harden
3. Detect
4. Respond
5. Recover
Protect
Intrusion Detection
and Prevention
Host-based IDS
• Monitor Critical and Sensitive Files via Integrity Checks
• Detects Rootkits
• Can monitor Windows Registry
• Alert on Changes
Windows 10 – Out of the box – CIS Benchmark
Secure Configuration
•CIS Benchmarks / DISA Stigs
•Configuration Management, while not exciting, is important
•Deploy configs across your enterprise using tools like GPO, Chef, Puppet,
or Ansible
•Change Management is also important
• Use git repo for tracking changes to your config scripts
PATCH IT ALL (kinda)
Patching Windows
+
Patching Linux
+
Build from the ground up
1. Identify
2. Protect and Harden
3. Detect
4. Respond
5. Recover
What’s happening on the endpoint?
•Facebook-developed osquery is effectively free EDR
• Agents for MacOS, Windows, Linux
• Deploy across your enterprise w/ Chef, Puppet, Ansible, or SCCM
• Do fun things like, search for IoCs (hashes, processes, etc.)
• Pipe the data into ElasticStack for visibility & searchability
•If you only need Windows, check out Microsoft Sysinternals Sysmon
What’s happening on the network?
•Elkstack
•Suricata
•Bro
•Snort
•SecurityOnion: put it all together
Logging and Monitoring
•Central logging makes detection and analysis easier
•Many options here, such as Windows Event Subscription, rsyslog
•Can also pipe to one central location with dashboards, such as ElasticStack
•Good idea to include DNS logs!
Testing
Controls
Breach and Attack Simulation
• CALDERA (Based ATT&CK)
• Uber Metta
• Endgame RTA
• Guardicore’s Infection Monkey
• Barkly’s Stackhackr
• Nextron Systems’ APTSimulator
• AlphaSOC’s flightsim
Education
Phishing
Education
• Phishing Frenzy
• Social Engineering Toolkit (SET)
• GoPhish
Parting thoughts…
• Build versus Buy
• Security Requirements don’t change, regardless of budget.
• Build a strong foundation and branch out.
• Consider scenarios – solve one scenario at a time, NOT all at once!
• Stay curious and contribute to projects you like.
• Community! Share ideas – learn from others
• DOCUMENT EVERYTHING
Kyle Bubp
kyle@threatcare.com
@kylebubp
@threatcare

More Related Content

PDF
Smart Platform Infrastructure with AWS
PDF
Alexander Naydenko - Nagios to Zabbix Migration | ZabConf2016
KEY
Migrating big data
PDF
Hacklu2011 tricaud
PDF
Dublin JUG February 2018 - Microservices in action at the Dutch National Police
PDF
Get There meetup March 2018 - Microservices in action at the Dutch National P...
ODP
2014 ZAP Workshop 2: Contexts and Fuzzing
PDF
Alexei Vladishev - Opening Speech
Smart Platform Infrastructure with AWS
Alexander Naydenko - Nagios to Zabbix Migration | ZabConf2016
Migrating big data
Hacklu2011 tricaud
Dublin JUG February 2018 - Microservices in action at the Dutch National Police
Get There meetup March 2018 - Microservices in action at the Dutch National P...
2014 ZAP Workshop 2: Contexts and Fuzzing
Alexei Vladishev - Opening Speech

What's hot (20)

ODP
OWASP 2015 AppSec EU ZAP 2.4.0 and beyond..
PDF
My pwk & oscp journey
PDF
Ryan Armstrong - Monitoring More Than 6000 Devices in Zabbix | ZabConf2016
PPTX
Security workflow with ansible
ODP
JoinSEC 2013 London - ZAP Intro
PDF
20140708 - Jeremy Edberg: How Netflix Delivers Software
PDF
Devoxx PL 2018 - Microservices in action at the Dutch National Police
ODP
2014 ZAP Workshop 1: Getting Started
PPTX
Open stack jobs avoiding the axe
ODP
Automating OWASP ZAP - DevCSecCon talk
PPT
Zabbix introduction ( RadixCloud Radix Technologies SA)
ODP
OWASP 2013 APPSEC USA Talk - OWASP ZAP
ODP
OWASP 2013 Limerick - ZAP: Whats even newer
PDF
NGINX User Summit. Wallarm llightning talk
PDF
IT security for all. Bootcamp slides
ODP
OWASP 2013 AppSec EU Hamburg - ZAP Innovations
ODP
OWASP 2013 EU Tour Amsterdam ZAP Intro
PPTX
Nouveautés de Zabbix 3.0 - Paris Monitoring meetup #2
ODP
BSides Manchester 2014 ZAP Advanced Features
PDF
Trouble Ticket Integration with Zabbix in Large Environment
OWASP 2015 AppSec EU ZAP 2.4.0 and beyond..
My pwk & oscp journey
Ryan Armstrong - Monitoring More Than 6000 Devices in Zabbix | ZabConf2016
Security workflow with ansible
JoinSEC 2013 London - ZAP Intro
20140708 - Jeremy Edberg: How Netflix Delivers Software
Devoxx PL 2018 - Microservices in action at the Dutch National Police
2014 ZAP Workshop 1: Getting Started
Open stack jobs avoiding the axe
Automating OWASP ZAP - DevCSecCon talk
Zabbix introduction ( RadixCloud Radix Technologies SA)
OWASP 2013 APPSEC USA Talk - OWASP ZAP
OWASP 2013 Limerick - ZAP: Whats even newer
NGINX User Summit. Wallarm llightning talk
IT security for all. Bootcamp slides
OWASP 2013 AppSec EU Hamburg - ZAP Innovations
OWASP 2013 EU Tour Amsterdam ZAP Intro
Nouveautés de Zabbix 3.0 - Paris Monitoring meetup #2
BSides Manchester 2014 ZAP Advanced Features
Trouble Ticket Integration with Zabbix in Large Environment
Ad

Similar to Blue Teaming on a Budget of Zero (20)

PPTX
Open Source Defense for Edge 2017
PPTX
Blue Teamin' on a Budget [of zero]
PPTX
Defending Enterprise IT - beating assymetricality
PPTX
How To Start Your InfoSec Career
PDF
Are you ready for the next attack? reviewing the sp security checklist (apnic...
PDF
Are you ready for the next attack? Reviewing the SP Security Checklist
PDF
Are you ready for the next attack? Reviewing the SP Security Checklist
PPTX
Disruptionware-TRustedCISO103020v0.7.pptx
PPTX
Information Security: Advanced SIEM Techniques
PPTX
Keynote at the Cyber Security Summit Prague 2015
PDF
Construye tu stack de ciberseguridad con open source
PPT
CyberCrime in the Cloud and How to defend Yourself
PPTX
Where to Start When Your Environment is Fucked
PPTX
BSides_Charm2015_Info sec hunters_gathers
PDF
RIoT (Raiding Internet of Things) by Jacob Holcomb
PPTX
InheritedASecurityDept
PPTX
Presentation infra and_datacentrre_dialogue_v2
PPTX
SCS DevSecOps Seminar - State of DevSecOps
PPT
Event - Internet Thailand - Total Security Perimeters
DOCX
FBI & Secret Service- Business Email Compromise Workshop
Open Source Defense for Edge 2017
Blue Teamin' on a Budget [of zero]
Defending Enterprise IT - beating assymetricality
How To Start Your InfoSec Career
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security Checklist
Disruptionware-TRustedCISO103020v0.7.pptx
Information Security: Advanced SIEM Techniques
Keynote at the Cyber Security Summit Prague 2015
Construye tu stack de ciberseguridad con open source
CyberCrime in the Cloud and How to defend Yourself
Where to Start When Your Environment is Fucked
BSides_Charm2015_Info sec hunters_gathers
RIoT (Raiding Internet of Things) by Jacob Holcomb
InheritedASecurityDept
Presentation infra and_datacentrre_dialogue_v2
SCS DevSecOps Seminar - State of DevSecOps
Event - Internet Thailand - Total Security Perimeters
FBI & Secret Service- Business Email Compromise Workshop
Ad

Recently uploaded (20)

PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
PDF
Ensemble model-based arrhythmia classification with local interpretable model...
PDF
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
PDF
Auditboard EB SOX Playbook 2023 edition.
PPTX
SGT Report The Beast Plan and Cyberphysical Systems of Control
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PDF
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
PPTX
Build automations faster and more reliably with UiPath ScreenPlay
PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PPTX
Presentation - Principles of Instructional Design.pptx
PDF
Decision Optimization - From Theory to Practice
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PDF
Build Real-Time ML Apps with Python, Feast & NoSQL
PDF
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
PDF
The AI Revolution in Customer Service - 2025
PDF
EIS-Webinar-Regulated-Industries-2025-08.pdf
PDF
A symptom-driven medical diagnosis support model based on machine learning te...
PDF
Altius execution marketplace concept.pdf
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
Ensemble model-based arrhythmia classification with local interpretable model...
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
Auditboard EB SOX Playbook 2023 edition.
SGT Report The Beast Plan and Cyberphysical Systems of Control
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
Build automations faster and more reliably with UiPath ScreenPlay
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
Presentation - Principles of Instructional Design.pptx
Decision Optimization - From Theory to Practice
Data Virtualization in Action: Scaling APIs and Apps with FME
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
Early detection and classification of bone marrow changes in lumbar vertebrae...
Build Real-Time ML Apps with Python, Feast & NoSQL
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
The AI Revolution in Customer Service - 2025
EIS-Webinar-Regulated-Industries-2025-08.pdf
A symptom-driven medical diagnosis support model based on machine learning te...
Altius execution marketplace concept.pdf

Blue Teaming on a Budget of Zero

  • 1. THREATCARE Open Source Defense Building a Security Program with Zero Budget
  • 2. Agenda •Budget challenges beyond CapEx/OpEx •Foundations: The big picture and where to start •Specific free & open-source tools to help at each step •Real-World Experiences and Fun Stories* *Randomly dispersed throughout
  • 3. whoami – Kyle Bubp • Just a dude trying to make things better.
  • 4. Security: What’s the “True Cost”? • Security = People + Processes + Products People • Salary • Training • Personal Dev • Management Processes • Plan (policy) • Build (tech) • Test • Improvement Products • CapEx/OpEx • Support • Time to Value • Labor:Value
  • 5. Why FOSS? Not just for people with budget constraints! It’s about time and control.
  • 6. Commercial 1. Google search 2. Choose three 3. Contact vendors 4. Proof of concept 5. Wine & dine 6. Procurement 7. Implementation Elapsed time: weeks/months FOSS 1. Google search 2. Download 3. Configure Elapsed time: minutes/hours Why FOSS?
  • 7. Shelfware Products that are purchased, but never get used or never fully achieve their intended value
  • 8. What ends up on the Shelf? What would get them off the shelf?
  • 10. Foundational Blueprints and Frameworks •NIST Standards and Frameworks •CIS Critical Security Controls •ISO 27000 •MITRE ATT&CK
  • 12. Document everything! A core documentation repository is critical •Policy, procedure, how-tos, etc: • MediaWiki • Atlassian Confluence ($10 for up to 10 users) •Incident Response Ticketing/Documentation: • RTIR (https://bestpractical.com/download-page) • The Hive (https://thehive-project.org/)
  • 13. Build from the ground up 1. Identify 2. Protect and Harden 3. Detect 4. Respond 5. Recover
  • 15. The Asset Discovery Dilemma Active Scanning? Nmap? Vuln Scanner? No. Ask your network! NetDB https://netdbtracking.sourceforge.net/ .ova available at https://www.kylebubp.com/files/netdb.ova
  • 16. Other network mapping approaches •nmap + ndiff/yandiff • Not just for red teams. • Export results, diff for changes. • Alert if something changed. •Netdisco • https://sourceforge.net/projects/netdisco • Uses SNMP to inventory your network devices
  • 17. Data Discovery •Users are good at putting sensitive data on the network. •Find it with OpenDLP
  • 18. OpenVAS •Fork of Nessus •Still maintained •Default vuln scanner in AlienVault •Does a great job in comparison w/ commercial products
  • 19. Web Apps too! •Arachni Framework (arachni-scanner.com) •OWASP ZAP (Zed Attack Proxy) •Nikto2 (more of a server config scanner) •Portswigger Burp Suite (not free - $350) •For a comparison – sectoolmarket.com
  • 20. In addition to fixing vulnerabilities… •Build in some additional security on your web servers. (also part of a secure configuration) •Fail2ban Python-based IPS that runs off of Apache Logs •Modsecurity Open source WAF for Apache, IIS, & nginx
  • 21. Build from the ground up 1. Identify 2. Protect and Harden 3. Detect 4. Respond 5. Recover
  • 24. Host-based IDS • Monitor Critical and Sensitive Files via Integrity Checks • Detects Rootkits • Can monitor Windows Registry • Alert on Changes
  • 25. Windows 10 – Out of the box – CIS Benchmark
  • 26. Secure Configuration •CIS Benchmarks / DISA Stigs •Configuration Management, while not exciting, is important •Deploy configs across your enterprise using tools like GPO, Chef, Puppet, or Ansible •Change Management is also important • Use git repo for tracking changes to your config scripts
  • 27. PATCH IT ALL (kinda)
  • 30. Build from the ground up 1. Identify 2. Protect and Harden 3. Detect 4. Respond 5. Recover
  • 31. What’s happening on the endpoint? •Facebook-developed osquery is effectively free EDR • Agents for MacOS, Windows, Linux • Deploy across your enterprise w/ Chef, Puppet, Ansible, or SCCM • Do fun things like, search for IoCs (hashes, processes, etc.) • Pipe the data into ElasticStack for visibility & searchability •If you only need Windows, check out Microsoft Sysinternals Sysmon
  • 32. What’s happening on the network? •Elkstack •Suricata •Bro •Snort •SecurityOnion: put it all together
  • 33. Logging and Monitoring •Central logging makes detection and analysis easier •Many options here, such as Windows Event Subscription, rsyslog •Can also pipe to one central location with dashboards, such as ElasticStack •Good idea to include DNS logs!
  • 35. Breach and Attack Simulation • CALDERA (Based ATT&CK) • Uber Metta • Endgame RTA • Guardicore’s Infection Monkey • Barkly’s Stackhackr • Nextron Systems’ APTSimulator • AlphaSOC’s flightsim
  • 37. Phishing Education • Phishing Frenzy • Social Engineering Toolkit (SET) • GoPhish
  • 38. Parting thoughts… • Build versus Buy • Security Requirements don’t change, regardless of budget. • Build a strong foundation and branch out. • Consider scenarios – solve one scenario at a time, NOT all at once! • Stay curious and contribute to projects you like. • Community! Share ideas – learn from others • DOCUMENT EVERYTHING