Selling your Information Security Team Part 4

Now it’s time to build the Swiss Army Knife of the demonstration: The Utility VM. This system will host the Snort IDS, the WebMail service and the cornerstone of the demonstration: the Splunk Service. In this part, we walk through installing the OS, Snort and WebMail.

Continuing the series on Selling Your Information Security Team, it’s now time to start building the Utility Virtual Machine that will host all the support programs and applications used in the demonstration.  This post will cover building that very importation Swiss Army Knife of the demonstration … the Utility Virtual Machine.  In Part 2 of this series, we built the host environment and defined the two networks joined by the firewall.  Then in Part 3 we build the firewall to join the previously defined networks together.

Continue reading “Selling your Information Security Team Part 4”

Selling your Information Security Team Part 3

Building on the framework that was designed in the previous posts, we are now ready to start creating our first Virtual Machine: the Firewall. This VM will join the two networks together and form the keystone of the demonstration before the Board of Directors.

As I continue this series on Selling Your Information Security Team, it’s now time to start building the Virtual Machines that will be used in the demonstration.  This post will cover building the keystone of the demonstration … the Firewall Virtual Machine.  In Part 2 of this series, we built the host environment and defined the two networks joined by the firewall.

Continue reading “Selling your Information Security Team Part 3”

Vulnhub Boot2Root “PwnLab: init”

The Boot2Root challenge “PwnLab: Init” took me several hours to complete.  Once completed, I reinstalled the OVF and walked through the sequence again (this time taking screen shots) to validate what I had done.  This walk-through details my solution of the “PwnLab: Init” Boot2Root published on VunlnHub.com August 1, 2016.

Overview

While this walk-through looks fairly strait forward it was not in reality.  There were a lot of dead-ends and attempts that didn’t work, or didn’t give me the results I wanted.  Once I found the correct path though, it took only a few minutes to walk through it again and document it with screen shots.

If you have not had a chance to complete the PwnLab:Init challenge on VulnHub STOP READING NOW.  This is a fun challenge and I recommend you try it.

Continue reading “Vulnhub Boot2Root “PwnLab: init””

Selling your Information Security Team Part 2

In this installment of “Selling your Information Security Team”, we discuss recommendations for your host computer and installation of Virtualization Software. We define the network types we will use and reveal what the virtual network layout will look like. Prepare to WOW your Board of Directors!

In the previous installment of this series, we discussed how Information Security can be similar to insurance … it’s only discussed when bad things happen, and it’s rarely a revenue generating center.  We also talked about how one might show return on investment in the Information Security Team.  Finally we walked through a four phase Cyber Kill Chain that could be used to simplify a complex demonstration of Information Security that could be presented to non-InfoSec managers and Board of Directors.  In this part of the series we will install Virtualization Software for the Virtual Penetration Lab that will be the foundation of our demonstration to the Board of Directors.

Continue reading “Selling your Information Security Team Part 2”

Selling your Information Security Team

How often have you had to argue or prove the value of your Information Security program to management? Here is an innovative way to do just that (without arguing).

Information Security can be similar to insurance … it’s only discussed when bad things happen and it’s rarely a revenue generating center.  So how does one show return on investment?  I was recently asked to do just that by participating in a presentation to our Board of Directors.  Senior management wanted to show off the new security operation center and the SOC team to the board.  My first thought was: <sarcasm>That is a great idea … they can walk through a SOC and see all the “Security Bling” screens on the wall.</sarcasm>  But after brain storming with the team, we actually came up with a great idea that I will be writing about over the next several weeks.

Continue reading “Selling your Information Security Team”