YoVDO

Skiddiemonkeys Fling Stuff at Your Defenses and See What Sticks

Offered By: YouTube

Tags

Security BSides Courses Cybersecurity Courses Command Line Interface Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore an innovative approach to network security testing with this conference talk from BSides Nashville 2015. Dive into the concept of "Skiddiemonkeys," automated tools that simulate hacker attacks on your network defenses. Learn about the methodology behind these tools, their similarities to chaos monkeys, and how they can help identify vulnerabilities in your system. Discover the components needed to set up your own Skiddiemonkey, including the "monkey food" and "monkey smarts." Gain insights from security experts like Dave Shackleford and John Strand on the importance of such tools in the face of financial constraints and outsourcing challenges. Examine the architecture, command-line interface, and main client page of the Skiddiemonkey system. Understand how automated malware works and how these simulated attacks can strengthen your network segmentation strategy. Finally, get a glimpse of future plans for this innovative security testing approach.

Syllabus

Intro
Who are we
Dave Shackleford
We need tools
Hackers
Attackers
John Strand
Network Segments
Methodology
How Automated Malware Works
Financial constraints
Outsourcing
Bad Guy Simulator
Chaos Monkeys
Skinny Monkeys
Website
Things youll need
Monkey Food
Monkey Smarts
Architecture Diagram
Commandline Interface
Main Client Page
Port Scan
Future Plans


Related Courses

Early Detection through Deception
YouTube
Hack for Show, Report for Dough - Brian King
YouTube
Blue Teamin on a Budget of Zero - Kyle Bubp
YouTube
Windows Event Logs - Zero to Hero
YouTube
Weaponizing Splunk - Using Blue Team Tools for Evil
YouTube