SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Collaboration Between Infosec
Community and CERT Teams : Project
Sonar case

1
Summary
1- Intro
2- A little Flashback
3- Who is the Infosec Community ?
3- What is Project Sonar ?
4- How can it be useful for CERT/CSIRT ?
5- What can be done ?
6- Conclusion
2
INTRO
●

●

/me {
Valdes T. Nzalli | @valdesjo77
Co-Founder & Security Evangelist at
Cameroon Cyber Security
}
Cameroon Cyber Security : {
NGO Association,
Infosec Workshops, Trainings, Awareness
and Share ! | @camcybersec
www.camcybersec.cm
« Be Secure, Be Safe ! » }
3
A LITTLE FLASHBACK
Internet Census Map (Carna Botnet)

4
Who is the Infosec Community ?
●

Infosec Researchers

●

Infosec Products Builders / Vendors

●

Security Analysts worldwide

5
What is Project Sonar ?
●

Scanning Public Internet-facing Systems

●

Analyse datasets provided by Scans

●

Share result and datasets with IT Security
Community
Datasets Availables :
IPv4 TCP banners & UDP probe replies
IPv4 Reverse DNS PTR records
IPv4 SSL Certificates
6
What is Project Sonar ?
●

Public Vulnerabilities on UpnP device reveled

7
What is Project Sonar ?
Serial Console Port Services exposed
worldwide

8
What is Project Sonar ?

OpenSSH servers usage and vulnerabilities
frequency in Africa

9
How can it be useful for
CERT/CSIRT ?

10
How can it be useful for
CERT/CSIRT ?
●

Workforce reduced

●

More Specific Awareness Campaign

●

●

Improvement of the Global Cybersecurity
State
Pro-active Incident Response

11
What can be done ?
●

●

●

●

●

Working together with Infosec
Researchers/Products Builders
Define standard of communication with Infosec
Community
Grab Datasets available for « internal » usage
Analyse and use this Informations for their
customers
Also, share their information with Infosec
Community to improve global Cybersecurity
12
Conclusion
Useful Ressources :
●

●

●

●

Project Sonar free Datasets https://scans.io/
Internet Census Project
http://internetcensus2012.bitbucket.org/

Rapid7 Community : Welcome to Project Sonar
https://community.rapid7.com/community/infosec/sonar/blog/2
Additional : Shodan HQ : www.shodanhq.com

13

Weitere ähnliche Inhalte

Ähnlich wie Collaboration Between Infosec Community and CERT Teams

2 s tic-rina-2020-presentatie
2 s tic-rina-2020-presentatie2 s tic-rina-2020-presentatie
2 s tic-rina-2020-presentatieEduard Grasa
 
Umesh nfc login application for mobile devices29th nov
Umesh nfc login application for mobile devices29th novUmesh nfc login application for mobile devices29th nov
Umesh nfc login application for mobile devices29th novUmeshjamce
 
TFI2014 Conference Opening - ISOC Deployment & Operationalization
TFI2014 Conference Opening - ISOC Deployment & OperationalizationTFI2014 Conference Opening - ISOC Deployment & Operationalization
TFI2014 Conference Opening - ISOC Deployment & OperationalizationColorado Internet Society (CO ISOC)
 
Pistoia Alliance Sequence Services Phase 2 Overview
Pistoia Alliance Sequence Services Phase 2 OverviewPistoia Alliance Sequence Services Phase 2 Overview
Pistoia Alliance Sequence Services Phase 2 OverviewPistoia Alliance
 
PITA Working Group Meeting on Cybersecurity: Empowering the community to enha...
PITA Working Group Meeting on Cybersecurity: Empowering the community to enha...PITA Working Group Meeting on Cybersecurity: Empowering the community to enha...
PITA Working Group Meeting on Cybersecurity: Empowering the community to enha...APNIC
 
Solar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenchesSolar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenchesInfosec
 
The Honeynet Project Introduction
The Honeynet Project IntroductionThe Honeynet Project Introduction
The Honeynet Project IntroductionJulia Yu-Chin Cheng
 
AARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara InitiativeAARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara Initiativekantarainitiative
 
Matteo meucci Software Security - Napoli 10112016
Matteo meucci   Software Security - Napoli 10112016Matteo meucci   Software Security - Napoli 10112016
Matteo meucci Software Security - Napoli 10112016Minded Security
 
ScadaLab Project
ScadaLab Project ScadaLab Project
ScadaLab Project JMBALBOA
 
stackconf 2021 | First hand experience: How Nextcloud stayed productive durin...
stackconf 2021 | First hand experience: How Nextcloud stayed productive durin...stackconf 2021 | First hand experience: How Nextcloud stayed productive durin...
stackconf 2021 | First hand experience: How Nextcloud stayed productive durin...NETWAYS
 
Getting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionGetting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionSplunk
 
The Neuroinformatics community in OpenAIRE Connect (Presentation by Sorina Po...
The Neuroinformatics community in OpenAIRE Connect (Presentation by Sorina Po...The Neuroinformatics community in OpenAIRE Connect (Presentation by Sorina Po...
The Neuroinformatics community in OpenAIRE Connect (Presentation by Sorina Po...OpenAIRE
 
ONF Snapshot
ONF SnapshotONF Snapshot
ONF SnapshotUS-Ignite
 
Monitoring indonesia darknets - Revealing the unseen security intrusion
Monitoring indonesia darknets - Revealing the unseen security intrusionMonitoring indonesia darknets - Revealing the unseen security intrusion
Monitoring indonesia darknets - Revealing the unseen security intrusionCharles Lim
 
Great Open Source Compliance For Everyone (Version 3)
Great Open Source Compliance For Everyone (Version 3)Great Open Source Compliance For Everyone (Version 3)
Great Open Source Compliance For Everyone (Version 3)Shane Coughlan
 
Why Johnny Can't Blow the Whistle
Why Johnny Can't Blow the WhistleWhy Johnny Can't Blow the Whistle
Why Johnny Can't Blow the Whistlegregnorc
 

Ähnlich wie Collaboration Between Infosec Community and CERT Teams (20)

Charles Lim - Honeynet Indonesia Chapter
Charles Lim - Honeynet Indonesia Chapter Charles Lim - Honeynet Indonesia Chapter
Charles Lim - Honeynet Indonesia Chapter
 
ION Belfast - Opening Slides - Chris Grundemann
ION Belfast - Opening Slides - Chris GrundemannION Belfast - Opening Slides - Chris Grundemann
ION Belfast - Opening Slides - Chris Grundemann
 
2 s tic-rina-2020-presentatie
2 s tic-rina-2020-presentatie2 s tic-rina-2020-presentatie
2 s tic-rina-2020-presentatie
 
Umesh nfc login application for mobile devices29th nov
Umesh nfc login application for mobile devices29th novUmesh nfc login application for mobile devices29th nov
Umesh nfc login application for mobile devices29th nov
 
TFI2014 Conference Opening - ISOC Deployment & Operationalization
TFI2014 Conference Opening - ISOC Deployment & OperationalizationTFI2014 Conference Opening - ISOC Deployment & Operationalization
TFI2014 Conference Opening - ISOC Deployment & Operationalization
 
Pistoia Alliance Sequence Services Phase 2 Overview
Pistoia Alliance Sequence Services Phase 2 OverviewPistoia Alliance Sequence Services Phase 2 Overview
Pistoia Alliance Sequence Services Phase 2 Overview
 
PITA Working Group Meeting on Cybersecurity: Empowering the community to enha...
PITA Working Group Meeting on Cybersecurity: Empowering the community to enha...PITA Working Group Meeting on Cybersecurity: Empowering the community to enha...
PITA Working Group Meeting on Cybersecurity: Empowering the community to enha...
 
Solar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenchesSolar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenches
 
The Honeynet Project Introduction
The Honeynet Project IntroductionThe Honeynet Project Introduction
The Honeynet Project Introduction
 
AARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara InitiativeAARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara Initiative
 
Matteo meucci Software Security - Napoli 10112016
Matteo meucci   Software Security - Napoli 10112016Matteo meucci   Software Security - Napoli 10112016
Matteo meucci Software Security - Napoli 10112016
 
ScadaLab Project
ScadaLab Project ScadaLab Project
ScadaLab Project
 
stackconf 2021 | First hand experience: How Nextcloud stayed productive durin...
stackconf 2021 | First hand experience: How Nextcloud stayed productive durin...stackconf 2021 | First hand experience: How Nextcloud stayed productive durin...
stackconf 2021 | First hand experience: How Nextcloud stayed productive durin...
 
Getting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionGetting Started with Splunk Breakout Session
Getting Started with Splunk Breakout Session
 
The Neuroinformatics community in OpenAIRE Connect (Presentation by Sorina Po...
The Neuroinformatics community in OpenAIRE Connect (Presentation by Sorina Po...The Neuroinformatics community in OpenAIRE Connect (Presentation by Sorina Po...
The Neuroinformatics community in OpenAIRE Connect (Presentation by Sorina Po...
 
ONF Snapshot
ONF SnapshotONF Snapshot
ONF Snapshot
 
EasyBuild State of the Union
EasyBuild State of the UnionEasyBuild State of the Union
EasyBuild State of the Union
 
Monitoring indonesia darknets - Revealing the unseen security intrusion
Monitoring indonesia darknets - Revealing the unseen security intrusionMonitoring indonesia darknets - Revealing the unseen security intrusion
Monitoring indonesia darknets - Revealing the unseen security intrusion
 
Great Open Source Compliance For Everyone (Version 3)
Great Open Source Compliance For Everyone (Version 3)Great Open Source Compliance For Everyone (Version 3)
Great Open Source Compliance For Everyone (Version 3)
 
Why Johnny Can't Blow the Whistle
Why Johnny Can't Blow the WhistleWhy Johnny Can't Blow the Whistle
Why Johnny Can't Blow the Whistle
 

Mehr von Valdes Nzalli

Pénétration de l'Internet en Afrique : Qu'en est-il des équipements ?
Pénétration de l'Internet en Afrique : Qu'en est-il des équipements ?Pénétration de l'Internet en Afrique : Qu'en est-il des équipements ?
Pénétration de l'Internet en Afrique : Qu'en est-il des équipements ?Valdes Nzalli
 
Etude Statistique d'un mois de Vulnérabilités en Afrique
Etude Statistique d'un mois de Vulnérabilités en AfriqueEtude Statistique d'un mois de Vulnérabilités en Afrique
Etude Statistique d'un mois de Vulnérabilités en AfriqueValdes Nzalli
 
Internet et Vie Privée Analyse des comportements en Afrique après PRISM
Internet et Vie Privée Analyse des comportements en Afrique après PRISMInternet et Vie Privée Analyse des comportements en Afrique après PRISM
Internet et Vie Privée Analyse des comportements en Afrique après PRISMValdes Nzalli
 
Cam cybersec fgi_reseaux_sociaux_et_securite_version_1.1
Cam cybersec fgi_reseaux_sociaux_et_securite_version_1.1Cam cybersec fgi_reseaux_sociaux_et_securite_version_1.1
Cam cybersec fgi_reseaux_sociaux_et_securite_version_1.1Valdes Nzalli
 
Valdes cyberguerre-barcamp2012
Valdes cyberguerre-barcamp2012Valdes cyberguerre-barcamp2012
Valdes cyberguerre-barcamp2012Valdes Nzalli
 
Valdes securite des application - barcamp2012
Valdes securite des application - barcamp2012Valdes securite des application - barcamp2012
Valdes securite des application - barcamp2012Valdes Nzalli
 
Government can save millions by reforming Security Policy
Government can save millions by reforming Security Policy Government can save millions by reforming Security Policy
Government can save millions by reforming Security Policy Valdes Nzalli
 
Cercle gt f-ssi_white_paper_finale5
Cercle gt f-ssi_white_paper_finale5Cercle gt f-ssi_white_paper_finale5
Cercle gt f-ssi_white_paper_finale5Valdes Nzalli
 
Rapport GEULLIC du 24-04-2011
Rapport GEULLIC du 24-04-2011Rapport GEULLIC du 24-04-2011
Rapport GEULLIC du 24-04-2011Valdes Nzalli
 
Logiciels libres cameroun m1
Logiciels libres cameroun m1Logiciels libres cameroun m1
Logiciels libres cameroun m1Valdes Nzalli
 
Presentation communaute (Cahier de Charg
Presentation communaute (Cahier de ChargPresentation communaute (Cahier de Charg
Presentation communaute (Cahier de ChargValdes Nzalli
 

Mehr von Valdes Nzalli (12)

#OpenData DevFest18
#OpenData DevFest18#OpenData DevFest18
#OpenData DevFest18
 
Pénétration de l'Internet en Afrique : Qu'en est-il des équipements ?
Pénétration de l'Internet en Afrique : Qu'en est-il des équipements ?Pénétration de l'Internet en Afrique : Qu'en est-il des équipements ?
Pénétration de l'Internet en Afrique : Qu'en est-il des équipements ?
 
Etude Statistique d'un mois de Vulnérabilités en Afrique
Etude Statistique d'un mois de Vulnérabilités en AfriqueEtude Statistique d'un mois de Vulnérabilités en Afrique
Etude Statistique d'un mois de Vulnérabilités en Afrique
 
Internet et Vie Privée Analyse des comportements en Afrique après PRISM
Internet et Vie Privée Analyse des comportements en Afrique après PRISMInternet et Vie Privée Analyse des comportements en Afrique après PRISM
Internet et Vie Privée Analyse des comportements en Afrique après PRISM
 
Cam cybersec fgi_reseaux_sociaux_et_securite_version_1.1
Cam cybersec fgi_reseaux_sociaux_et_securite_version_1.1Cam cybersec fgi_reseaux_sociaux_et_securite_version_1.1
Cam cybersec fgi_reseaux_sociaux_et_securite_version_1.1
 
Valdes cyberguerre-barcamp2012
Valdes cyberguerre-barcamp2012Valdes cyberguerre-barcamp2012
Valdes cyberguerre-barcamp2012
 
Valdes securite des application - barcamp2012
Valdes securite des application - barcamp2012Valdes securite des application - barcamp2012
Valdes securite des application - barcamp2012
 
Government can save millions by reforming Security Policy
Government can save millions by reforming Security Policy Government can save millions by reforming Security Policy
Government can save millions by reforming Security Policy
 
Cercle gt f-ssi_white_paper_finale5
Cercle gt f-ssi_white_paper_finale5Cercle gt f-ssi_white_paper_finale5
Cercle gt f-ssi_white_paper_finale5
 
Rapport GEULLIC du 24-04-2011
Rapport GEULLIC du 24-04-2011Rapport GEULLIC du 24-04-2011
Rapport GEULLIC du 24-04-2011
 
Logiciels libres cameroun m1
Logiciels libres cameroun m1Logiciels libres cameroun m1
Logiciels libres cameroun m1
 
Presentation communaute (Cahier de Charg
Presentation communaute (Cahier de ChargPresentation communaute (Cahier de Charg
Presentation communaute (Cahier de Charg
 

Kürzlich hochgeladen

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Collaboration Between Infosec Community and CERT Teams

  • 1. Collaboration Between Infosec Community and CERT Teams : Project Sonar case 1
  • 2. Summary 1- Intro 2- A little Flashback 3- Who is the Infosec Community ? 3- What is Project Sonar ? 4- How can it be useful for CERT/CSIRT ? 5- What can be done ? 6- Conclusion 2
  • 3. INTRO ● ● /me { Valdes T. Nzalli | @valdesjo77 Co-Founder & Security Evangelist at Cameroon Cyber Security } Cameroon Cyber Security : { NGO Association, Infosec Workshops, Trainings, Awareness and Share ! | @camcybersec www.camcybersec.cm « Be Secure, Be Safe ! » } 3
  • 4. A LITTLE FLASHBACK Internet Census Map (Carna Botnet) 4
  • 5. Who is the Infosec Community ? ● Infosec Researchers ● Infosec Products Builders / Vendors ● Security Analysts worldwide 5
  • 6. What is Project Sonar ? ● Scanning Public Internet-facing Systems ● Analyse datasets provided by Scans ● Share result and datasets with IT Security Community Datasets Availables : IPv4 TCP banners & UDP probe replies IPv4 Reverse DNS PTR records IPv4 SSL Certificates 6
  • 7. What is Project Sonar ? ● Public Vulnerabilities on UpnP device reveled 7
  • 8. What is Project Sonar ? Serial Console Port Services exposed worldwide 8
  • 9. What is Project Sonar ? OpenSSH servers usage and vulnerabilities frequency in Africa 9
  • 10. How can it be useful for CERT/CSIRT ? 10
  • 11. How can it be useful for CERT/CSIRT ? ● Workforce reduced ● More Specific Awareness Campaign ● ● Improvement of the Global Cybersecurity State Pro-active Incident Response 11
  • 12. What can be done ? ● ● ● ● ● Working together with Infosec Researchers/Products Builders Define standard of communication with Infosec Community Grab Datasets available for « internal » usage Analyse and use this Informations for their customers Also, share their information with Infosec Community to improve global Cybersecurity 12
  • 13. Conclusion Useful Ressources : ● ● ● ● Project Sonar free Datasets https://scans.io/ Internet Census Project http://internetcensus2012.bitbucket.org/ Rapid7 Community : Welcome to Project Sonar https://community.rapid7.com/community/infosec/sonar/blog/2 Additional : Shodan HQ : www.shodanhq.com 13