<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Dan</title>
    <description>The latest articles on DEV Community by Dan (@4q-u4).</description>
    <link>https://dev.to/4q-u4</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1810402%2Ff6174633-7743-414d-b8f9-ac37f2f5d88c.jpg</url>
      <title>DEV Community: Dan</title>
      <link>https://dev.to/4q-u4</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/4q-u4"/>
    <language>en</language>
    <item>
      <title>Cryptography Concepts Simplified</title>
      <dc:creator>Dan</dc:creator>
      <pubDate>Sat, 17 Aug 2024 08:20:16 +0000</pubDate>
      <link>https://dev.to/4q-u4/cryptography-concepts-simplified-21j0</link>
      <guid>https://dev.to/4q-u4/cryptography-concepts-simplified-21j0</guid>
      <description>&lt;h2&gt;
  
  
  What is Cryptography
&lt;/h2&gt;

&lt;p&gt;Cryptography is scary, Its based on math that most of us don't understand yet it makes the internet secure. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F61ehzk6yq8meoqnw98r4.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F61ehzk6yq8meoqnw98r4.jpg" alt="Hard math equations" width="800" height="500"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Cryptography takes bytes of data and scrambles them up with an algorithm making it really impossible for you to understand.&lt;/p&gt;

&lt;h2&gt;
  
  
  Brief History of Cryptography
&lt;/h2&gt;

&lt;p&gt;Cryptography is the science of creating secrets and it has been around since 1900BC long before the computer. &lt;/p&gt;

&lt;p&gt;Before humans got good at math, they used to tattoo messages on the scalps of slaves and wait for the hair to grow back, and send them to other leaders. Although this seems a bit vulnerable since the attacker can shave the head of the slave but it seems that the message itself seemed to work. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvo8awgf7p65ovmtn9rgs.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvo8awgf7p65ovmtn9rgs.png" alt="Old Cryptography using slave's head" width="800" height="405"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Things got much better by the time of Julian Caesar who shifted the letters of the alphabet before passing the message to his military generals.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F810sruhk51q8tx2fu4zu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F810sruhk51q8tx2fu4zu.png" alt="Ceaser Cipher" width="600" height="251"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Important Cryptography Concepts:
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Hash
&lt;/h3&gt;

&lt;p&gt;The first concept we will look at is the hash, Hash is the action of chopping and mixing.&lt;/p&gt;

&lt;p&gt;You start with an input that is any length that is passed off to a hashing function, this function will return a fixed length value of what looks like garbage.&lt;/p&gt;

&lt;p&gt;Same Input -&amp;gt; Same Output&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fed01251vddufyvzm1q87.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fed01251vddufyvzm1q87.png" alt="Hashing password" width="800" height="401"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Salt
&lt;/h3&gt;

&lt;p&gt;Now the fact that the hashing function will always return the same output, its a bit predictable and also a problem when it comes to passwords.&lt;/p&gt;

&lt;p&gt;This brings us to the second cryptography topic which is Salt. Salt is a random value that is added to the password before it's hashed, therefore making it much harder to guess. &lt;/p&gt;

&lt;h3&gt;
  
  
  HMAC
&lt;/h3&gt;

&lt;p&gt;Hash-Based Message Authentication Code is a hash that also requires a password, so the only person that can create the same hash signature must also have the corresponding hash password &lt;/p&gt;

&lt;h3&gt;
  
  
  Encryption
&lt;/h3&gt;

&lt;p&gt;What if you want to share a secret with someone and allow them to read the original message. This is where encryption comes in.&lt;/p&gt;

&lt;p&gt;With encryption we take a message scramble up the bytes and make it unreadable, this is called cipher text and provide a key allowing someone else to decrypt it.&lt;/p&gt;

</description>
      <category>cryptography</category>
      <category>security</category>
      <category>infosec</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>CrowdStrike Blew Up the Internet</title>
      <dc:creator>Dan</dc:creator>
      <pubDate>Sat, 20 Jul 2024 13:22:31 +0000</pubDate>
      <link>https://dev.to/4q-u4/crowdstrike-blew-up-the-internet-2c0h</link>
      <guid>https://dev.to/4q-u4/crowdstrike-blew-up-the-internet-2c0h</guid>
      <description>&lt;h2&gt;
  
  
  Bad code broke a million Windows machines...
&lt;/h2&gt;

&lt;p&gt;Yesterday millions of Windows computers got &lt;strong&gt;BRICKED&lt;/strong&gt; around the world thanks to an update pushed by enterprise cybersecurity firm CrowdStrike. Airports are shutting down, hospitals are unable to treat patients, and banks are not able to get your money.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1p38ocygc6fg94hnn5hi.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1p38ocygc6fg94hnn5hi.jpg" alt="Image description" width="800" height="600"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Let's dig deeper into the technical side of this disaster and find out how such a catastrophic mistake can even happen in the modern work:
&lt;/h3&gt;

&lt;p&gt;A huge number of fortune 500 companies use CrowdStrike for cybersecurity, its primary product is called "Falcon". Falcon is a tool that provides ENDPOINT protection using artificial intelligence and analytics to detect threats in real time. It is publicly traded, and its stock is down right now because everybody is blaming them for the BSOD.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F567rt2jp5yggqresjshr.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F567rt2jp5yggqresjshr.jpg" alt="Image description" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Luckily MacOS and Linux chads are unaffected, to understand why we first need to understand how CrowdStrike's Falcon Sensor actually works. Falcon is installed just like regular software but integrates with the OS at a low level often using kernel mode drivers and sits there in the background looking for threats. So basically, it is a third-party software sitting in the critical path of a computer. If it fails, the entire computer might fail.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frzpg8dupxqgybclo2ekf.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frzpg8dupxqgybclo2ekf.jpg" alt="Image description" width="800" height="814"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Apparently, some automated software update yesterday had some bad code in it and every computer that got that update is now dead. Part of the reason this is bad, is that it's not a normal outage but every affected computer needs rebooted into safe mode so that the driver can be removed manually.&lt;/p&gt;

&lt;h3&gt;
  
  
  However, they were quick to fix it...
&lt;/h3&gt;

&lt;p&gt;The fix is really &lt;strong&gt;EASY&lt;/strong&gt;. All you have to do is the following:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Detach the OS Disk&lt;/li&gt;
&lt;li&gt;Create a Snapshot of the disk&lt;/li&gt;
&lt;li&gt;Mount a Volume to new virtual server&lt;/li&gt;
&lt;li&gt;Find driver (%WINDIR&amp;amp;\System32\drivers\CrowdStrike)&lt;/li&gt;
&lt;li&gt;Delete the bad file (C-00000291*.sys)&lt;/li&gt;
&lt;li&gt;Detach Volume from virtual server&lt;/li&gt;
&lt;li&gt;Reattach volume to impacted server&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Piece of cake... but option 2 is to go buy a hammer and use it to uninstall windows and install Linux.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Feg4ld9bp7byqaqdac129.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Feg4ld9bp7byqaqdac129.gif" alt="Image description" width="363" height="270"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;What everyone failed to realize is that giving one company kernel access to the computer of most companies might actually be a bad idea, because it only takes 1 automatic update with a misplaced 0 to nearly destroy the entire world.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmjvfltnr9yhdsa4w5422.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmjvfltnr9yhdsa4w5422.gif" alt="Image description" width="430" height="225"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>microsoft</category>
      <category>windows</category>
      <category>crowdstrike</category>
    </item>
  </channel>
</rss>
