Hardening Two

Second Open Day about enforcing Linux security


Your OS is weak... but maybe you don't know it!

June 13, 2016 @ 11.00 am
Department of Mathematics and IT, University of Catania

Thank you!


Thank you!

You were awesome, thank you for being part of that day. It was truly fun!
Scoll down for more details or go to the downloads.

Why hardening?

0-Day exploits and treats you don't know yet harm your computer and servers.

Hardening tools have been out in the wild for some time but they're now gaining more attention.
Creating and managing policies that lets your programs do only what they were designed for, prevents many attacks and exploitation likely to be unknown. At work, in local networks and online no more excuses.
It's time to harden.

STAG !?

SELinux - Tomoyo - App armor - GrSecurity

That's how we called these four hardening tools we'll be using and compare during the live demos.
It has been some time since they appeared in the security scene and IT people, especially sys admins, should be aware of them.
That's why we're going to show them to you live.

The STAG hunt has already started, so it's better for you to jump in!

Event outline

Speakers

Pietro Tirenna

Computer Engineering student, University of Catania


Passionate student, excited about pentesting and hacking in all of its forms.

Francesco Pira

Computer Engineering student, University of Catania


Startupper and web developer curious about computer security and new tech.



Get content

Yes, do it at home! Download the slides and the code we used, start playing.






Keep in touch

If you think this is nice stuff, want to contribute,
share ideas or want to improve something,
feel free to drop us a line.

hardening [at] fileshute [dot] com