r/hacking • u/RoseSec_ • 6d ago
AMA I built the first Coast Guard Red Team, open-sourced thousands of attack techniques, then left to help businesses secure their infrastructure. Ask me anything!
My name is RoseSecurity, creator of Red-Teaming TTPs and Anti-Virus-Evading-Payloads. I'm also an active MITRE, OWASP, and Debian contributor/maintainer, although more of my recent projects have been cloud-focused. I went from cybersecurity in the government to helping businesses build secure infrastructure in the cloud. Ask me anything about contributing to open source projects, security research, or cloud security!
Edit: I helped build the Coast Guard Red Team. I was just a small piece in an awesome team doing great stuff. Sorry if I ruffled any feathers 🤙
13
u/gothichuskydad 5d ago
I work in the field on the blue team side. While there's no question here, I just gotta say I really appreciate the level of detail and how thorough you are in answering these. For an AMA it's rare to see a "no stone left unturned" method and it's much appreciated.
Been working for 9 years and have actually used some of your resources. Fantastic work. Thanks a ton!
6
u/RoseSec_ 5d ago
You have no idea how much I appreciate this. My biggest motivator is writing tools and TTPs that are actually used, so I’m thankful they are helping you defend! If you ever have find anything that you think would benefit the greater community, feel free to open a PR or an issue and we can get it added. We’re all in this together
3
u/gothichuskydad 5d ago
Don't worry, I definitely will. I'm pushing to make threat hunting a more community driven process at my current org and they are jumping on the train like it's the next best thing.
Keep doing what you do. On the blue, red, and even purple side we appreciate it a ton! I'll let you get back to answering questions though haha.
7
u/intelw1zard potion seller 5d ago
Thanks for doing this AMA!
Some questions:
- What advice would you have for someone first getting into cybersec?
- What is the most challenging cert you've studied for?
- In your opinion, what do you believe to be the most serious cyber threat?
10
u/RoseSec_ 5d ago
Love these.
My advice for those getting into the infosec field is to stay curious and take time to understand the underlying concepts and technologies rather than just the tools. It's easy to run a command, but what do the bytes actually look like going across the wire? That creates great learning opportunities from both the offensive and defensive perspectives.
The most challenging for me was GIAC Exploit Researcher and Advanced Penetration Tester (GXPN). I took it too early in my career when I was primarily working in the SIEM space and wasn't diving into OS internals, so I got completely lost in the sauce. I'd definitely revisit the materials although many of the techniques are now legacy.
No comment ;) I'm sworn to secrecy
5
u/I_am_BrokenCog 5d ago
Were you involved with the NSA Red Team Certification process? How bureaucratic did that get?
7
5d ago
[deleted]
3
u/I_am_BrokenCog 5d ago
I know the Ft. Meade team very well. They can be very helpful -- once all the hoops are lined up :).
2
u/RoseSec_ 5d ago
They’re a great group and taught me a lot. I worked on the other side of the house on the UNIX blue team there.
3
u/I_am_BrokenCog 5d ago
What years were you there?
I was there from '07 until '13
2
u/RoseSec_ 5d ago
Heck yeah, I was there from ‘19 to ‘23 so a little more recent but same old same old I’m sure
3
u/Responsible_Minute12 5d ago
Thoughts on honey pots and deceptions?
6
u/RoseSec_ 5d ago
I developed an open source project called Gaspot over the past few years that emulates a Veeder Root Guardian AST, the tank gauging system commonly found at gas stations across the United States. After deploying it in my homelab with internet exposure, it generated interesting insights into how various tools and actors interact with these systems. I also created a simulation of a local water tower control system, which revealed additional attack methodologies due to its web-based interface. I wrote a blog here if you're interested in the technical details. The honeypots had some fascinating data on threat actor behavior, but the scariest experiment I did involved embedding a canary token in our password manager to monitor for potential breaches...
3
u/Soberaddiction1 5d ago
Have you been on or would you go on u/jackrhysider podcast? The subreddit for it is r/darknetdiaries
8
u/RoseSec_ 5d ago
Not sure if my career is exciting enough to have a narrative written about and podcasted, but I have some war stories from the trenches 🤙
5
u/Soberaddiction1 5d ago
He can make the boring and mundane worth listening to. He’s got a great podcast.
7
u/DamianDaws 5d ago
Thanks for being here to answer questions. I’m new to hacking and engineering. How did you get started and what tools would you recommend for beginners?
14
3
5
2
u/intelw1zard potion seller 5d ago
also what is your favorite open source project to contribute to?
7
u/RoseSec_ 5d ago
My favorite has to be the entire Cloud Posse ecosystem of Terraform components, modules, and tools to manage infra. Being able to write features and improvements for code that is downloaded millions of times is super fulfilling. Other than that, I'd definitely say Trufflehog is an awesome group. They are super responsive to pull requests and fun to work with.
3
2
u/Deadlydragon218 5d ago
Whatup TISCOM
1
u/RoseSec_ 5d ago
Yessir, I miss those $3 civie breakfasts
4
u/Deadlydragon218 5d ago
I worked at OSC as a contractor for about 5 years NaaS Ops. Miss you all dearly, I had fun being the email security guy and thinking through ways to block some spam/scam campaigns. The sextortion campaign was of particular interest as the entire body of the email was variable save for a few select words. Printed out a bunch of those in my cube and was highlighting similarities.
2
u/Spiritual-Matters 4d ago edited 4d ago
How did you get started and what got you hired?
2
u/RoseSec_ 4d ago
I joined the military after high school and got to go through lots of cool training. I decided to shift from traditional vulnerability assessments and red teaming into the world of infrastructure so I could help organizations design and build securely. Something about infrastructure as code and automation that makes for a fun time
3
-1
12
u/TheOGgeekymalcolm 5d ago
Wondering what tools you used as your "daily driver" / go to tools?