Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletter Hub
Free Learning
Arrow right icon
timer SALE ENDS IN
0 Days
:
00 Hours
:
00 Minutes
:
00 Seconds
Arrow up icon
GO TO TOP
Security Automation with Ansible 2

You're reading from   Security Automation with Ansible 2 Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis

Arrow left icon
Product type Paperback
Published in Dec 2017
Publisher Packt
ISBN-13 9781788394512
Length 364 pages
Edition 1st Edition
Tools
Arrow right icon
Authors (2):
Arrow left icon
Akash Mahajan Akash Mahajan
Author Profile Icon Akash Mahajan
Akash Mahajan
 AKULA AKULA
Author Profile Icon AKULA
AKULA
Arrow right icon
View More author details
Toc

Table of Contents (18) Chapters Close

Title Page
Credits
About the Authors
About the Reviewer
www.PacktPub.com
Customer Feedback
Preface
1. Introduction to Ansible Playbooks and Roles 2. Ansible Tower, Jenkins, and Other Automation Tools FREE CHAPTER 3. Setting Up a Hardened WordPress with Encrypted Automated Backups 4. Log Monitoring and Serverless Automated Defense (Elastic Stack in AWS) 5. Automating Web Application Security Testing Using OWASP ZAP 6. Vulnerability Scanning with Nessus 7. Security Hardening for Applications and Networks 8. Continuous Security Scanning for Docker Containers 9. Automating Lab Setups for Forensics Collection and Malware Analysis 10. Writing an Ansible Module for Security Testing 11. Ansible Security Best Practices, References, and Further Reading

Creating Ansible playbooks for labs for isolated environments


We will start by using VirusTotal and move on to Cuckoo with a Windows virtual machine in an isolated network. Another important aspect of malware analysis is the ability to collaborate and share threats using the Malware Information Sharing Platform (MISP). We also setup Viper (binary management and analysis framework) to perform the analysis.

Collecting file and domain malware identification and classification

One of the initial phases of malware analysis is identification and classification. The most popular source is using VirusTotal to scan and get the results of the malware samples, domain information, and so on. It has a very rich API and a lot of people have written custom apps that leverage the API to perform the automated scans using the API key for identifying the malware type.  The following example is to set up the VirusTotal tool in the system, scan the malware samples against the VirusTotal API, and identify whether...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime
Visually different images