CNAPPGoat - Noam Dahan, Igal Gofman

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • number6
    404 Image not found
    • Apr 2019
    • 2172

    #1

    CNAPPGoat - Noam Dahan, Igal Gofman

    CNAPPGoat

    Friday August 11, 12:00 – 13:55, Accord Boardroom, Forum

    Noam Dahan & Igal Gofman

    CNAPPGoat is a multi-cloud vulnerable-by-design environment deployment tool – it deploys vulnerable environments to various cloud service providers, so that offensive professionals and pentesters can practice exploiting them and defenders can practice detection and prevention. CNAPPGoat is an extensible modular tool that deploys environments with more complex scenarios - vulnerable VMs, multi-stage lateral movement attacks, IaC misconfigurations, and vulnerable IAM misconfigurations.

    Noam Dahan is a Senior Security Researcher at Ermetic with several years of experience in embedded security. He is a graduate of the Talpiot program at the Israel Defense Forces and spent several years in the 8200 Intelligence Corps. Noam was a competitive debater and is a former World Debating Champion.

    Igal Gofman is a Head of Security Research at Ermetic. Igal has a proven track record in cloud security, network security, research-oriented development, and threat intelligence. His research interests include cloud security, operating systems, and active directory. Prior to Ermetic Igal worked at Microsoft, XM-Cyber, and Check Point Software Technologies. Igal has spoken at various leading security conferences including Black Hat and DEF-CON. |
    Audience - Primary audience: Defense, Cloud Security, Secondary audience - Offense​
    Starts
    August 11, 2023 12:00
    Ends
    August 11, 2023 13:55
    Location
    Accord Boardroom, Forum
  • Noam
    Member
    • Aug 2022
    • 2

    #2
    CNAPPgoat is officially launched and available at https://github.com/ermetic-research/cnappgoat

    As it says above, CNAPPgoat is an open-source project designed to modularly provision vulnerable-by-design components in cloud environments. You can use its to test detection, prevention and remediation, and pentest strategies in diverse scenarios e.g.: launch a container with a crypto-miner installed, spawn a machine with a vulnerable image, create a public IAM role, etc.

    Looking forward to seeing everyone at DEF CON!

    Here's a gif of the tool at work:​
    Click image for larger version

Name:	release.gif
Views:	402
Size:	4.01 MB
ID:	246945
    Attached Files

    Comment

    Working...