Automating Security Analysis

A few months ago I began working on a short paper to generate CPEs used for renewing my GIAC/SANS certifications.  With few requirements around what the content or format of the paper had to be, this left me opened to writing about something I truly enjoy – automation.

For years I have worked on IRC bots[1], proxy monitoring[2] and wargame[3] automation in my spare time.  At work I spend the majority of my time designing, implementing and managing automation for a variety of purposes.  This paper is not meant as a definitive guide on all things automation, but rather as my perspective on designing automation specific to analytical workflows.

The final version of this paper is a long way from where I started, and almost double the length required for my certifications.  I ended up learning quite a lot about something I already thought I knew in the process.  Many thanks to those of you who provided feedback and review of this to help me get it polished.

Hopefully this is useful or interesting to someone other than me: Automating Security Analysis

[1] http://blog.psych0tik.net/2010/10/writing-irc-bots-using-ii/

[2] http://blog.psych0tik.net/2011/10/updates-to-proxyelite-pe-api-and-fresher-proxies/

[3] http://overthewire.org/warzone/

About samurai

I like computers... A lot. So I tend to spend a lot of time doing varied things with them. Often you'll find me playing with Python or PHP, fighting with operating systems, ranting about some off-the-wall concept, or preparing for zombies.
This entry was posted in Articles, Guides and tagged , , , . Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *