Skip to content

Commit 46124ef

Browse files
authored
Merge pull request #169 from godinezj/week8_jg_contribs
Updated prior week content
2 parents fc0c0cc + 9ca1884 commit 46124ef

9 files changed

Lines changed: 30 additions & 54 deletions

File tree

Week-4/README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,13 +6,13 @@ During Week 4, we'll understand the basics of keeping technology available, hunt
66
- Using logging and instrumentation to find attackers
77
- Detection & Alerting
88

9-
## [Getting to know your data](LESSON-1.md)
9+
## [LESSON 1: Getting to know your data](LESSON-1.md)
1010
During this lesson, we'll begin to understand basic logging and evaluate how an attacker can access a system from behind the scenes. In this session, we'll understand some basics for a popular logging system.
1111

12-
## [Create and test alerts](LESSON-2.md)
12+
## [LESSON 2: Create and test alerts](LESSON-2.md)
1313
Creating and testing alerts can help you to identify when attacks are happening. This can help to aid in the strength of protective controls or allow for risks to be evaluated.
1414

15-
## [Creating reports and dashboards](LESSON-3.md)
15+
## [LESSON 3: Creating reports and dashboards](LESSON-3.md)
1616
Enabling reporting and dashboards for the blue team to help discover an attacker quickly can make or break an app that depends on quick detection and response.
1717

1818
## Resources

Week-5/README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,13 +6,13 @@ Building rugged and secure applications is not trivial. Software Engineers and D
66
- Understanding AWS CloudFormation Templates
77
- Scaling Infrastructure-as-Code
88

9-
## [Infrastructure-as-Code](LESSON-1.md)
9+
## [LESSON 1: Infrastructure-as-Code](LESSON-1.md)
1010
During this lesson, we'll be introduced to the concept "Infrastructure-as-Code". What it is and what benefits it provides us.
1111

12-
## [Application Availability & CloudFormation](LESSON-2.md)
12+
## [LESSON 2: Application Availability & CloudFormation](LESSON-2.md)
1313
Understanding AWS CloudFormation Templates and patterns for safe and secure infrastructure.
1414

15-
## [End-to-End Infrastructure-as-Code](LESSON-3.md)
15+
## [LESSON 3: End-to-End Infrastructure-as-Code](LESSON-3.md)
1616
Scaling Infrastructure-as-Code.
1717

1818
## Resources

Week-6/LESSON-1.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Lesson 1: Infrastructure as Code (IaC) [![slides](../_images/slides-clean.png)](slides/june-DSO-bootcamp-week-six-lesson-one.pdf)[![view](../_images/view-clean.png)](https://speakerdeck.com/devsecops/devsecops-bootcamp-week-6-lesson-1)
1+
# Lesson 1: Offensive Security [![slides](../_images/slides-clean.png)](slides/june-DSO-bootcamp-week-six-lesson-one.pdf)[![view](../_images/view-clean.png)](https://speakerdeck.com/devsecops/devsecops-bootcamp-week-6-lesson-1)
22

33
##
44

Week-6/LESSON-3.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Lesson 3: End-to-end Infrastructure as Code [![slides](../_images/slides-clean.png)](slides/june-DSO-bootcamp-week-six-lesson-three.pdf)[![view](../_images/view-clean.png)](https://speakerdeck.com/devsecops/devsecops-bootcamp-week-6-lesson-3)
1+
# Lesson 3: AWS IAM Security [![slides](../_images/slides-clean.png)](slides/june-DSO-bootcamp-week-six-lesson-three.pdf)[![view](../_images/view-clean.png)](https://speakerdeck.com/devsecops/devsecops-bootcamp-week-6-lesson-3)
22

33
## Agenda
44

Week-6/README.md

Lines changed: 7 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -1,32 +1,17 @@
1-
<!-- START doctoc generated TOC please keep comment here to allow auto update -->
2-
<!-- DON'T EDIT THIS SECTION, INSTEAD RE-RUN doctoc TO UPDATE -->
3-
**Table of Contents** *generated with [DocToc](https://github.com/thlorenz/doctoc)*
4-
5-
- [WEEK 6 OUTLINE](#week-6-outline)
6-
- [OBJECTIVES](#objectives)
7-
- [AGENDA](#agenda)
8-
- [BONUS LABS](#bonus-labs)
9-
- [ASSIGNMENTS](#assignments)
10-
11-
<!-- END doctoc generated TOC please keep comment here to allow auto update -->
12-
131
# WEEK 6: Rugged Sec
2+
The Cloud introduces a new attack vector into our environment which needs to be well understood and mitigated. Techniques demonstrated this week will enable awareness to ways infrastructure can be abused by attackers.
143

154
## OBJECTIVES
165
- Account Takeovers
176
- Advanced cloud hacking techniques:
187
- Lateral movement
198
- Privilege escalation
209

21-
## AGENDA
22-
TIME | TOPIC
23-
---|---
24-
5 PM - 5:50 PM | Thinking Outside the Box
25-
6 PM - 6:45 PM | Lab: Deploy vulnerable `Jenkins` or `JBOSS` & exploit via Java Deserialization
26-
7 PM - 7:50 PM | Lab: Advanced cloud hacking techniques
27-
8 PM - 9 PM | Lab: Advanced cloud hacking techniques
2810

29-
## BONUS LABS
30-
- Write a Java Deserialization Payload
11+
## [Lesson 1: Offensive Security](LESSON-1.md)
12+
13+
## [Lesson 2: Network Attack](LESSON-2.md)
14+
15+
## [Lesson 3: AWS IAM Security](LESSON-3.md)
3116

32-
## ASSIGNMENTS
17+
## Resources

Week-7/LESSON-1.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Lesson 1: [![slides](../_images/slides-clean.png)](slides/june-DSO-bootcamp-week-seven-lesson-one.pdf)[![view](../_images/view-clean.png)](https://speakerdeck.com/devsecops/devsecops-bootcamp-week-7-lesson-1)
1+
# Lesson 1: Gathering Forensics Data [![slides](../_images/slides-clean.png)](slides/june-DSO-bootcamp-week-seven-lesson-one.pdf)[![view](../_images/view-clean.png)](https://speakerdeck.com/devsecops/devsecops-bootcamp-week-7-lesson-1)
22

33
## Agenda
44

Week-7/LESSON-2.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Lesson 2: [![slides](../_images/slides-clean.png)](slides/june-DSO-bootcamp-week-seven-lesson-two.pdf)[![view](../_images/view-clean.png)](https://speakerdeck.com/devsecops/devsecops-bootcamp-week-7-lesson-2)
1+
# Lesson 2: Capturing Forensic Images [![slides](../_images/slides-clean.png)](slides/june-DSO-bootcamp-week-seven-lesson-two.pdf)[![view](../_images/view-clean.png)](https://speakerdeck.com/devsecops/devsecops-bootcamp-week-7-lesson-2)
22

33
## Agenda
44

Week-7/LESSON-3.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,13 @@
1-
# Lesson 3: [![slides](../_images/slides-clean.png)](slides/june-DSO-bootcamp-week-eight-lesson-three.pdf)[![view](../_images/view-clean.png)](https://speakerdeck.com/devsecops/devsecops-bootcamp-week-8-lesson-3)
1+
# Lesson 3: Performing Basic Forensics [![slides](../_images/slides-clean.png)](slides/june-DSO-bootcamp-week-eight-lesson-three.pdf)[![view](../_images/view-clean.png)](https://speakerdeck.com/devsecops/devsecops-bootcamp-week-8-lesson-3)
22

33
## Agenda
44

55
```
6-
*
7-
*
8-
*
9-
*
6+
* Forensic Investigation Basics
7+
* Enterprise Forensic Analysis
8+
* Memory
9+
* Disk
10+
* Tools
1011
* Lab 3
1112
```
1213

Week-7/README.md

Lines changed: 7 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,29 +1,19 @@
1-
<!-- START doctoc generated TOC please keep comment here to allow auto update -->
2-
<!-- DON'T EDIT THIS SECTION, INSTEAD RE-RUN doctoc TO UPDATE -->
3-
**Table of Contents** *generated with [DocToc](https://github.com/thlorenz/doctoc)*
4-
5-
- [WEEK 7 OUTLINE](#week-7-outline)
6-
- [OBJECTIVES](#objectives)
7-
- [AGENDA](#agenda)
8-
9-
<!-- END doctoc generated TOC please keep comment here to allow auto update -->
10-
111
# WEEK 7: Incident Response and Forensics
2+
The 90's called, they want their datacenter back. The Cloud is not the datacenter, and so we must reinvent forensics for the Cloud. We do not have direct access to hosts and network, but we do have the tools at our disposal to perform forensics.
123

134
## OBJECTIVES
145
- Incident Response on the Cloud
156
- Cloud Forensics
167

17-
## AGENDA
18-
TIME | TOPIC
19-
---|---
20-
6 PM - 6:50 PM | Lab 1
21-
7 PM - 7:45 PM | Lab 2
22-
8 PM - 8:30 PM | Lab 3
8+
# Lesson 1: Gathering Forensics Data
9+
10+
# Lesson 2: Capturing Forensic Images
11+
12+
# Lesson 3: Performing Basic Forensics
2313

2414
## Resources
2515
- [Week 6 Lab 2](../Week-6/labs/LAB-2.md)
2616
- [Week 6 Lab 3](../Week-6/labs/LAB-3.md)
2717
- [Forensics Wiki](http://forensicswiki.org/wiki/Main_Page)
2818
- [AWS CLI Reference](http://docs.aws.amazon.com/cli/latest/reference/)
29-
- [Forensics Tools](http://www.forensicswiki.org/wiki/Tools)
19+
- [Forensics Tools](http://www.forensicswiki.org/wiki/Tools)

0 commit comments

Comments
 (0)