Skip to main content

Instructions

The following guide will assume you are following the most friction-less approach for setting up your environment, namely using the provided Docker Compose infrastructure. If you are using another approach, follow the guide and adapt the Docker-specific steps to your scenario.

Types of tasks

The tasks are marked as follows:

  • ✅: Recommended being followed;
  • ❌: Avoidable due to time constraints or lack of difficulty; and
  • ✌️: Optional, but fun to do if you have some spare time!

Tasks

Step IDTaskWith an instructor (beginner)With an instructor (advanced)Without an instructor (beginner)Without an instructor (advanced)
1Access the wiki and enable the mode specific to your experience.
2Ensure you have the environment set before starting the workshop.
3Watch one of the available recordings of The Open Source Fortress.
4Understand how software is built and how the security model looks like.
5Understand what Sand Castle is and how it works. (You can skip the demos, as you'll directly interact with the software.)
6Skim read the vulnerabilities' listing that you can find in Sand Castle. You'll come back regularly to this page to look for pointers.
7You'll start with the first vulnerability discovery technique.
8Watch the Basics page of the current vulnerability discovery technique.✌️
9You'll start with the first open source tool.
10Open the documentation of the software.
11Enter the specified Docker container.
12Solve each task specified on the page, eventually by checking the docs.
13If you are blocked, check the proposed solutions.
14If you are blocked, ask for an instructor's help.
15When you solved all the tasks, visit the page of the next open source tool for the current vulnerability detection technique. Go to step 10.
16When you solved all the tasks from all the tools in the current vulnerability detection technique, you'll start the section of a new technique. Go to step 8. If you finished all the techniques, continue to step 17.
17Check what other analysis and automation tooling exists.
18Bookmark the security checklist and cheatsheet for getting started. This is distilled knowledge, so it may be helpful for you in the future!