Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore an innovative approach to network security testing with this conference talk from BSides Nashville 2015. Dive into the concept of "Skiddiemonkeys," automated tools that simulate hacker attacks on your network defenses. Learn about the methodology behind these tools, their similarities to chaos monkeys, and how they can help identify vulnerabilities in your system. Discover the components needed to set up your own Skiddiemonkey, including the "monkey food" and "monkey smarts." Gain insights from security experts like Dave Shackleford and John Strand on the importance of such tools in the face of financial constraints and outsourcing challenges. Examine the architecture, command-line interface, and main client page of the Skiddiemonkey system. Understand how automated malware works and how these simulated attacks can strengthen your network segmentation strategy. Finally, get a glimpse of future plans for this innovative security testing approach.
Syllabus
Intro
Who are we
Dave Shackleford
We need tools
Hackers
Attackers
John Strand
Network Segments
Methodology
How Automated Malware Works
Financial constraints
Outsourcing
Bad Guy Simulator
Chaos Monkeys
Skinny Monkeys
Website
Things youll need
Monkey Food
Monkey Smarts
Architecture Diagram
Commandline Interface
Main Client Page
Port Scan
Future Plans