Infrastructure fuzzing by Salo Shp, SRE Expert.
In this session We will cover the reason and methods hackers use to DDOS our production, and learn how to mitigate that threat by doing it ourselves as part of an overall Chaos Engineering methodology.
18. ATTACK CLASSIFICATION
Design Implementation Operation
Application
Presentation
Session
Transport
Network
Link
Physical
Spoofing
Tampering
Repudiation
Information disclosure
Degr. of service
Elevation of privilege
Damage
Reproducibility
Exploitability
Affected users
Discoverability
Salo Shp
20. “What’s in a name? That which we call a rose,
By any other name would smell as sweet.”
ÉMILE BOREL
1871 - 1956
21. https://en.wikipedia.org/wiki/Punched_card
A punch-card is a piece of stiff
paper that can be used to contain
digital data represented by the
presence or absence of holes in
predefined positions.
ArnoldReinhold, CC BY-SA 3.0, https://commons.wikimedia.org/w/index.php?curid=16041053
1950
23. http://www.folklore.org/StoryView.py?story=Monkey_Lives.txt
A small desk accessory that used the
journaling hooks to feed random events to
the current application, so the Macintosh
seemed to be operated by an incredibly fast,
somewhat angry monkey, banging away at the
mouse and keyboard, generating clicks and
drags at random positions with wild abandon
1983 - The monkey
STEVE CAPPS