Обязанности и достижения:
• Management of Russian pentesters team. Eighteen staff members. Seven web and infrastructure pentesters and eleven IoT devices pentesters. Cooperation with international company management and Chinese pentesters team. Conducting weekly team meetings and writing reports.
• To start a Russian information security branch of Skyline Info Technologies I assisted in Skyline Info Technologies child company registration in Russia, opening a local bank account, office renting, negotiations with business centre management, office infrastructure development (electronic office equipment, servers, workstations, laptops, internet connection, local network, technical equipment needed for IoT devices pentesters work like soldering stations, digital analysers and other).
• I was selecting and interviewing candidates. Testing the knowledge of IoT devices security, web-services and infrastructure security, black-box/ grey-box/ white-box pentesting, vulnerability’s mining, reverse engineering, fuzzing, firmware unpacking, programming (C++, Python, PHP) and other.
• To organize and regulate the working process I set up Redmine project management system, GIT version control system, Proxmox Mail Gateway (corporate internal mail), Cryptpad online documents and files service (open source analogue of Google docs with strong encryption), Openfire Jabber instant messenger with OTR encryption (in addition to other public messengers for secure communications). Also I set up dozens of VPN servers, VPS and dedicated servers for different tasks.
• I took a part in pentesting of web services and infrastructures of several big Chinese company’s (vendors of: Smart TV, set-top boxes, routers, online gambling services). Also with a web pentesting team we have done several security audits of company owned services.
In general, under my command, web and infrastructure pentesting team found critical vulnerability’s in dozens of company’s resources and two famous software vendors, IoT devices pentesting team found several zero-day vulnerability’s in Tp-Link, Draytek, Asus, Gee, Tenda.
• As one of the ways to find a zero day vulnerability’s in IoT devices is to use honeypots. Problem with many open source solution that implement honeypots is that they can easily be detected as “fake devices”. I developed my own honeypot system in which http requests and telnet TCP connections were transparently forwarded to a real device or to device firmware launched in emulator. All HTTP requests and telnet TCP connections are recorded; HTTP requests are automatically analyzed against main web security threats.
• On a daily basis, the company interacts with thousands of different devices (VPS, dedicated servers, IoT devices). To automate routine operations with them like checking online status, running security scans, mass software deployment, mass commands execution and others, I developed a Device Management Framework. That automation control system allowed to manage and monitor devices with different architectures, OS’s, control interfaces (protocols – Telnet, SSH, HTTP) from a single central panel.
• I assisted with company gambling games development and operating department in improving High Availability for some of the game servers. I built a typical infrastructure, that could easily be extended on demand, of five high performance servers (32 cores, 128 GB RAM) servers. One server is load balancer with HAProxy. Two servers included software pack of Nginx, PHP-FPM and Redis. Two servers of MariaDB. MariaDB servers were united in Galera cluster with multi-master replication. Redis servers were united in Dynomite cluster with multi-master replication. In case of game server being implemented as a C++ application, Nginx worked as a stream proxy.
Balancing requests to such cluster groups by DNS load balancing now serves hundreds of thousands connections per second from players.