SlideShare a Scribd company logo
Bringing Harmony between Dev
and Ops and Security Teams
using Gauntlt
Be Mean to
your Code
with
Gauntlt
@wickett
College Startup
Web Systems Engineer
Media Startup
Web Ops Lead
DevOps
CISSP
CISSP, sounds cool
a brief
history of
infosec
1337 tools
the worms
and viruses
didn’t stop
we faced
skilled
adversaries
we couldn’t
win
Instead of
Engineering
InfoSec
became
Actuaries
“[RISK ASSESSMENT]
INTRODUCES A DANGEROUS
FALLACY: THAT
STRUCTURED INADEQUACY
IS ALMOST AS GOOD AS
ADEQUACY AND THAT
UNDERFUNDED SECURITY
EFFORTS PLUS RISK
MANAGEMENT ARE ABOUT
AS GOOD AS PROPERLY
FUNDED SECURITY WORK”
there were
other
movements
devs became cool
devs became cool agile
the biz
sells time
now
Brining Harmony between Dev and Ops and Security Teams using Gauntlt at ISC2 Austin Event
dev and ops
now play nice
http://www.slideshare.net/jallspaw/10-deploys-per-day-dev-and-ops-cooperation-at-flickr
http://www.slideshare.net/jallspaw/10-deploys-per-day-dev-and-ops-cooperation-at-flickr
culture
automation
measurement
sharing
credit to John Willis and Damon Edwards
infosec
hasn’t kept
pace
Your punch
is soft,just
like your
heart
“Is this
Secure?”
-Your
Customer
“It’s
Certified”
-You
Brining Harmony between Dev and Ops and Security Teams using Gauntlt at ISC2 Austin Event
6 R’s of
Rugged
DevOps
http://www.slideshare.net/wickett/putting-rugged-into-your-devops-toolchain
how does
one join
rugged
devops?
Brining Harmony between Dev and Ops and Security Teams using Gauntlt at ISC2 Austin Event
enter
gauntlt
gauntlt is
like this
sqlmap sslyze
dirb
curl
generic
nmap
your app
gauntlt
exit status: 0
gauntlt
credits:
Creators:
Mani Tadayon
James Wickett
Community Wrangler:
Jeremiah Shirk
Friends:
Jason Chan, Netflix
Neil Matatall, Twitter
security tools
are confusing
mapping
discovery
exploitation
fuzzfind inject
security
tests on
every change
wisdom from
a video game
always
listen to
Doc
Find the
weakness of
your enemy
Codify your
knowledge
(cheat sheets)
sometimes, you
face the same
enemies again
gauntlt is
collaboration
Gauntlt helps
dev and ops
and security
to communicate
gauntlt
harmonizes
our languages
Behavior
Driven
Development
BDD is a second-generation, outside–in, pull-based,
multiple-stakeholder, multiple-scale, high-automation, agile
methodology. It describes a cycle of interactions with well-
defined outputs, resulting in the delivery of working, tested
software that matters.
Dan North , 2009
we have to
start
somewhere
$ gem install gauntlt
install gauntlt
gauntlt
design
Simple
Extensible
UNIX™: stdin, stdout, exit status
Minimum features yield maximum
utility
$ gauntlt --list
Defined attacks:
curl
dirb
garmr
generic
nmap
sqlmap
sslyze
Attack File
Plain Text File
Gherkin syntax:
Given
When
Then
Feature: nmap attacks for example.com
Background:
Given "nmap" is installed
And the following profile:
| name | value |
| hostname | example.com |
Scenario: Verify server is open on expected ports
When I launch an "nmap" attack with:
"""
nmap -F <hostname>
"""
Then the output should contain:
"""
80/tcp open http
"""
Scenario: Verify that there are no unexpected ports open
When I launch an "nmap" attack with:
"""
nmap -F <hostname>
"""
Then the output should not contain:
"""
25/tcp
"""
Given
When
Then
When
Then
running gauntlt with failing tests
$ gauntlt
Feature: nmap attacks for example.com
Background:
Given "nmap" is installed
And the following profile:
| name | value |
| hostname | example.com |
Scenario: Verify server is open on expected ports
When I launch an "nmap" attack with:
"""
nmap -F www.example.com
"""
Then the output should contain:
"""
443/tcp open https
"""
1 scenario (1 failed)
5 steps (1 failed, 4 passed)
0m18.341s
$ gauntlt
Feature: nmap attacks for example.com
Background:
Given "nmap" is installed
And the following profile:
| name | value |
| hostname | example.com |
Scenario: Verify server is open on expected ports
When I launch an "nmap" attack with:
"""
nmap -F www.example.com
"""
Then the output should contain:
"""
443/tcp open https
"""
1 scenario (1 passed)
4 steps (4 passed)
0m18.341s
running gauntlt with passing tests
$ gauntlt --steps
/^"(w+)" is installed in my path$/
/^"curl" is installed$/
/^"dirb" is installed$/
/^"garmr" is installed$/
/^"nmap" is installed$/
/^"sqlmap" is installed$/
/^"sslyze" is installed$/
/^I launch a "curl" attack with:$/
/^I launch a "dirb" attack with:$/
/^I launch a "garmr" attack with:$/
/^I launch a "generic" attack with:$/
/^I launch an "nmap" attack with:$/
/^I launch an "sslyze" attack with:$/
/^I launch an? "sqlmap" attack with:$/
/^the "(.*?)" command line binary is installed$/
/^the file "(.*?)" should contain XML:$/
/^the file "(.*?)" should not contain XML:$/
/^the following cookies should be received:$/
/^the following profile:$/
$ gauntlt --steps
/^"(w+)" is installed in my path$/
/^"sqlmap" is installed$/
/^I launch a "generic" attack with:$/
/^I launch an? "sqlmap" attack with:$/
Feature: nmap attacks for example.com
Background:
Given "nmap" is installed
And the following profile:
| name | value |
| hostname | example.com |
Scenario: Verify server is open on expected ports
When I launch an "nmap" attack with:
"""
nmap -F <hostname>
"""
Then the output should contain:
"""
80/tcp open http
"""
Scenario: Verify that there are no unexpected ports open
When I launch an "nmap" attack with:
"""
nmap -F <hostname>
"""
Then the output should not contain:
"""
25/tcp
"""
setup steps
verify
tool
set
config
Feature: nmap attacks for example.com
Background:
Given "nmap" is installed
And the following profile:
| name | value |
| hostname | example.com |
Scenario: Verify server is open on expected ports
When I launch an "nmap" attack with:
"""
nmap -F <hostname>
"""
Then the output should contain:
"""
80/tcp open http
"""
Scenario: Verify that there are no unexpected ports open
When I launch an "nmap" attack with:
"""
nmap -F <hostname>
"""
Then the output should not contain:
"""
25/tcp
"""
attack
get
config
Feature: nmap attacks for example.com
Background:
Given "nmap" is installed
And the following profile:
| name | value |
| hostname | example.com |
Scenario: Verify server is open on expected ports
When I launch an "nmap" attack with:
"""
nmap -F <hostname>
"""
Then the output should contain:
"""
80/tcp open http
"""
Scenario: Verify that there are no unexpected ports open
When I launch an "nmap" attack with:
"""
nmap -F <hostname>
"""
Then the output should not contain:
"""
25/tcp
"""
assert
needle
haystack
Supported
Tools
curl
nmap
sqlmap
sslyze
Garmr
dirb
generic
Netflix
Use Case
Real World Cloud Application Security, Jason Chan
https://vimeo.com/54157394
Check your ssl certs
cookie tampering
curl hacking
Look for common
apache
misconfigurations
@slow
Feature: Run dirb scan on a URL
Scenario: Run a dirb scan looking for common
vulnerabilities in apache
Given "dirb" is installed
And the following profile:
| name | value |
| hostname | http://example.com |
| wordlist | vulns/apache.txt |
When I launch a "dirb" attack with:
"""
dirb <hostname> <dirb_wordlists_path>/<wordlist>
"""
Then the output should contain:
"""
FOUND: 0
"""
.htaccess
.htpasswd
.meta
.web
access_log
cgi
cgi-bin
cgi-pub
cgi-script
dummy
error
error_log
htdocs
httpd
httpd.pid
icons
server-info
server-status
logs
manual
printenv
test-cgi
tmp
~bin
~ftp
~nobody
~root
I have my weakness.
But I won't tell
you! Ha Ha Ha!
Test for SQL
Injection
@slow @announce
Feature: Run sqlmap against a target
Scenario: Identify SQL injection vulnerabilities
Given "sqlmap" is installed
And the following profile:
| name | value |
| target_url | http://example.com?x=1 |
When I launch a "sqlmap" attack with:
"""
python <sqlmap_path> -u <target_url> --dbms sqlite --batch -v 0 --tables
"""
Brining Harmony between Dev and Ops and Security Teams using Gauntlt at ISC2 Austin Event
my_first.attack
See ‘GET STARTED’ on
project repo
Start here > https://
github.com/gauntlt/
gauntlt/tree/master/
examples
Find examples for the
attacks
Add your config (hostname,
login url, user)
Repeat
Starter Kit on GitHub
The starter kit is on GitHub:
github.com/gauntlt/gauntlt-starter-kit
Or, download a copy from:
www.gauntlt.org/
@gauntlt
future plans
Next
Features
More output parsers
More attack adapters
JRuby & Java Support
Front end UI / web
reports
Add feature
requests here:
https://github.com/
gauntlt/gauntlt/
issues
Contribute
to gauntlt
See ‘FOR DEVELOPERS’ in
the README
Get started in 7 steps
If you get
stuck
Check the README
IRC Channel: #gauntlt on
freenode
@gauntlt on twitter
Mailing List (https://
groups.google.com/forum/#!forum/gauntlt)
Office hours with weekly
google hangout
get started
with gauntlt
github/gauntlt
gauntlt.org
videos
tutorials
google group
@gauntlt
IRC #gauntlt
we
help!
start here
cool
vids!
@wickett
james@gauntlt.org
Be Mean to
Your Code!
@wickett
james@gauntlt.org
slides:
bit.ly/gauntlt-isc2

More Related Content

PDF
Rugged by example with Gauntlt (Hacker Headshot)
James Wickett
 
PDF
Be Mean to Your Code - OWASP San Antonio
James Wickett
 
PDF
Be Mean to your Code with Gauntlt #txlf 2013
James Wickett
 
PDF
Gauntlt Rugged By Example
James Wickett
 
PDF
Run your code through the Gauntlt
James Wickett
 
PPTX
Advanced Weapons Training for the Empire
Jeremy Johnson
 
PDF
Rugged Driven Development with Gauntlt
James Wickett
 
PDF
Be Mean to Your Code
James Wickett
 
Rugged by example with Gauntlt (Hacker Headshot)
James Wickett
 
Be Mean to Your Code - OWASP San Antonio
James Wickett
 
Be Mean to your Code with Gauntlt #txlf 2013
James Wickett
 
Gauntlt Rugged By Example
James Wickett
 
Run your code through the Gauntlt
James Wickett
 
Advanced Weapons Training for the Empire
Jeremy Johnson
 
Rugged Driven Development with Gauntlt
James Wickett
 
Be Mean to Your Code
James Wickett
 

What's hot (20)

PDF
Gauntlt: Go Ahead, Be Mean to your Code
James Wickett
 
PDF
Terraform - Taming Modern Clouds
Nic Jackson
 
PDF
A Hands-on Introduction on Terraform Best Concepts and Best Practices
Nebulaworks
 
PPTX
Async programming: From 0 to task.IsComplete - es
Darío Kondratiuk
 
PDF
HTTP For the Good or the Bad
Xavier Mertens
 
PPTX
Invoke-Obfuscation nullcon 2017
Daniel Bohannon
 
PDF
Are you ready to be hacked?
Daniel Kanchev
 
PDF
ruxc0n 2012
mimeframe
 
PDF
Revoke-Obfuscation
Daniel Bohannon
 
PDF
SignaturesAreDead Long Live RESILIENT Signatures
Daniel Bohannon
 
PDF
Rails security: above and beyond the defaults
Matias Korhonen
 
PDF
Selenium sandwich-3: Being where you aren't.
Workhorse Computing
 
PDF
Designing net-aws-glacier
Workhorse Computing
 
PDF
DevSec Defense
Daniel Bohannon
 
PDF
Webscraping with asyncio
Jose Manuel Ortega Candel
 
PDF
PesterSec: Using Pester & ScriptAnalyzer to Detect Obfuscated PowerShell
Daniel Bohannon
 
KEY
Deploying Plack Web Applications: OSCON 2011
Tatsuhiko Miyagawa
 
PDF
Malicious Payloads vs Deep Visibility: A PowerShell Story
Daniel Bohannon
 
PPTX
How to discover 1352 Wordpress plugin 0days in one hour (not really)
Larry Cashdollar
 
PPTX
Fun with exploits old and new
Larry Cashdollar
 
Gauntlt: Go Ahead, Be Mean to your Code
James Wickett
 
Terraform - Taming Modern Clouds
Nic Jackson
 
A Hands-on Introduction on Terraform Best Concepts and Best Practices
Nebulaworks
 
Async programming: From 0 to task.IsComplete - es
Darío Kondratiuk
 
HTTP For the Good or the Bad
Xavier Mertens
 
Invoke-Obfuscation nullcon 2017
Daniel Bohannon
 
Are you ready to be hacked?
Daniel Kanchev
 
ruxc0n 2012
mimeframe
 
Revoke-Obfuscation
Daniel Bohannon
 
SignaturesAreDead Long Live RESILIENT Signatures
Daniel Bohannon
 
Rails security: above and beyond the defaults
Matias Korhonen
 
Selenium sandwich-3: Being where you aren't.
Workhorse Computing
 
Designing net-aws-glacier
Workhorse Computing
 
DevSec Defense
Daniel Bohannon
 
Webscraping with asyncio
Jose Manuel Ortega Candel
 
PesterSec: Using Pester & ScriptAnalyzer to Detect Obfuscated PowerShell
Daniel Bohannon
 
Deploying Plack Web Applications: OSCON 2011
Tatsuhiko Miyagawa
 
Malicious Payloads vs Deep Visibility: A PowerShell Story
Daniel Bohannon
 
How to discover 1352 Wordpress plugin 0days in one hour (not really)
Larry Cashdollar
 
Fun with exploits old and new
Larry Cashdollar
 
Ad

Similar to Brining Harmony between Dev and Ops and Security Teams using Gauntlt at ISC2 Austin Event (20)

PDF
Gauntlt Rugged By Example
London School of Cyber Security
 
PDF
Be Mean to Your Code - DevOps Days Austin 2013
James Wickett
 
PDF
Putting Rugged Into your DevOps Toolchain
James Wickett
 
PDF
Security testing with gauntlt
James Wickett
 
PDF
business
Gajendra Saini
 
PDF
CSEC 610 Individual Assignment Essay
Rochelle Schear
 
PDF
Wrangle Your Defense Using Offensive Tactics - ISSA May Meeting
Matt Dunn
 
PPTX
DC612 Day - Hands on Penetration Testing 101
dc612
 
PPTX
N map presentation
ulirraptor
 
PPTX
G3t R00t at IUT
Nahidul Kibria
 
PDF
O PODER DO NMAP ATRAVÉS DE SEUS COMANDOS.pdf
Maicon Wendhausen
 
PDF
Cybersecurity Ops With Bash Attack Defend And Analyze From The Command Line 1...
guhmanlosic
 
PPTX
BSides_Charm2015_Info sec hunters_gathers
Andrew McNicol
 
PDF
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
Bishop Fox
 
PDF
Rugged Software Using Rugged Driven Development
James Wickett
 
PDF
CNIT 152: 10 Enterprise Services
Sam Bowne
 
PDF
Network Vulnerabilities And Cyber Kill Chain Essay
Karen Oliver
 
PPTX
Nmap not only a port scanner by ravi rajput comexpo security awareness meet
Ravi Rajput
 
PDF
CNIT 121: 10 Enterprise Services
Sam Bowne
 
ODP
Nmap Scripting Engine and http-enumeration
Robert Rowley
 
Gauntlt Rugged By Example
London School of Cyber Security
 
Be Mean to Your Code - DevOps Days Austin 2013
James Wickett
 
Putting Rugged Into your DevOps Toolchain
James Wickett
 
Security testing with gauntlt
James Wickett
 
business
Gajendra Saini
 
CSEC 610 Individual Assignment Essay
Rochelle Schear
 
Wrangle Your Defense Using Offensive Tactics - ISSA May Meeting
Matt Dunn
 
DC612 Day - Hands on Penetration Testing 101
dc612
 
N map presentation
ulirraptor
 
G3t R00t at IUT
Nahidul Kibria
 
O PODER DO NMAP ATRAVÉS DE SEUS COMANDOS.pdf
Maicon Wendhausen
 
Cybersecurity Ops With Bash Attack Defend And Analyze From The Command Line 1...
guhmanlosic
 
BSides_Charm2015_Info sec hunters_gathers
Andrew McNicol
 
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
Bishop Fox
 
Rugged Software Using Rugged Driven Development
James Wickett
 
CNIT 152: 10 Enterprise Services
Sam Bowne
 
Network Vulnerabilities And Cyber Kill Chain Essay
Karen Oliver
 
Nmap not only a port scanner by ravi rajput comexpo security awareness meet
Ravi Rajput
 
CNIT 121: 10 Enterprise Services
Sam Bowne
 
Nmap Scripting Engine and http-enumeration
Robert Rowley
 
Ad

More from James Wickett (20)

PDF
A Pragmatic Union: Security and SRE
James Wickett
 
PDF
A Way to Think about DevSecOps: MEASURE
James Wickett
 
PDF
The Security, DevOps, and Chaos Playbook to Change the World
James Wickett
 
PDF
Pragmatic Pipeline Security
James Wickett
 
PDF
A Tale of Woe, Chaos, and Business
James Wickett
 
PDF
A DevSecOps Tale of Business, Engineering, and People
James Wickett
 
PDF
The New Ways of DevSecOps - The Secure Dev 2019
James Wickett
 
PDF
NewOps Days 2019: The New Ways of Chaos, Security, and DevOps
James Wickett
 
PDF
The New Ways of Chaos, Security, and DevOps
James Wickett
 
PDF
DevOpsDays Austin: Security in the FaaS Lane
James Wickett
 
PDF
The Seven Habits of the Highly Effective DevSecOp
James Wickett
 
PDF
Serverless Security: A How-to Guide @ SnowFROC 2019
James Wickett
 
PDF
Release Your Inner DevSecOp
James Wickett
 
PDF
Security in the FaaS Lane
James Wickett
 
PDF
The New Security Playbook: DevSecOps
James Wickett
 
PDF
The Emergent Cloud Security Toolchain for CI/CD
James Wickett
 
PDF
Adversary Driven Defense in the Real World
James Wickett
 
PDF
The DevSecOps Builder’s Guide to the CI/CD Pipeline
James Wickett
 
PDF
DevSecOps and the CI/CD Pipeline
James Wickett
 
PDF
The State of DevSecOps in 2018
James Wickett
 
A Pragmatic Union: Security and SRE
James Wickett
 
A Way to Think about DevSecOps: MEASURE
James Wickett
 
The Security, DevOps, and Chaos Playbook to Change the World
James Wickett
 
Pragmatic Pipeline Security
James Wickett
 
A Tale of Woe, Chaos, and Business
James Wickett
 
A DevSecOps Tale of Business, Engineering, and People
James Wickett
 
The New Ways of DevSecOps - The Secure Dev 2019
James Wickett
 
NewOps Days 2019: The New Ways of Chaos, Security, and DevOps
James Wickett
 
The New Ways of Chaos, Security, and DevOps
James Wickett
 
DevOpsDays Austin: Security in the FaaS Lane
James Wickett
 
The Seven Habits of the Highly Effective DevSecOp
James Wickett
 
Serverless Security: A How-to Guide @ SnowFROC 2019
James Wickett
 
Release Your Inner DevSecOp
James Wickett
 
Security in the FaaS Lane
James Wickett
 
The New Security Playbook: DevSecOps
James Wickett
 
The Emergent Cloud Security Toolchain for CI/CD
James Wickett
 
Adversary Driven Defense in the Real World
James Wickett
 
The DevSecOps Builder’s Guide to the CI/CD Pipeline
James Wickett
 
DevSecOps and the CI/CD Pipeline
James Wickett
 
The State of DevSecOps in 2018
James Wickett
 

Recently uploaded (20)

PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
Software Development Methodologies in 2025
KodekX
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PDF
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
Doc9.....................................
SofiaCollazos
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
Software Development Methodologies in 2025
KodekX
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
Doc9.....................................
SofiaCollazos
 

Brining Harmony between Dev and Ops and Security Teams using Gauntlt at ISC2 Austin Event