<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Hafiz Muhammad Attaullah</title>
    <description>The latest articles on DEV Community by Hafiz Muhammad Attaullah (@attaullahshafiq10).</description>
    <link>https://dev.to/attaullahshafiq10</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F548831%2Fc55dba93-e6cb-4eb9-8c57-6ddfa2e4a432.png</url>
      <title>DEV Community: Hafiz Muhammad Attaullah</title>
      <link>https://dev.to/attaullahshafiq10</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/attaullahshafiq10"/>
    <language>en</language>
    <item>
      <title>From Foundations to Cybersecurity Architect: My Microsoft Certification Journey</title>
      <dc:creator>Hafiz Muhammad Attaullah</dc:creator>
      <pubDate>Fri, 18 Apr 2025 20:59:48 +0000</pubDate>
      <link>https://dev.to/attaullahshafiq10/from-foundations-to-cybersecurity-architect-my-microsoft-certification-journey-5339</link>
      <guid>https://dev.to/attaullahshafiq10/from-foundations-to-cybersecurity-architect-my-microsoft-certification-journey-5339</guid>
      <description>&lt;p&gt;it’s a moment of pride and reflection for me as I officially earned the Microsoft Certified: Cybersecurity Architect Expert (SC-100) certification — the highest level in Microsoft’s security track. But let me be clear: this wasn’t just a single exam. This was a journey — a story of growth, challenges, discipline, and an unshakable commitment to becoming better at what I do. This is my journey, from SC-900 all the way to SC-100 — and everything in between.&lt;/p&gt;

&lt;p&gt;It all started with curiosity. Cybersecurity was always more than a buzzword to me. It was about protecting value, designing resilience, and staying one step ahead of threats. I knew that to truly excel in this domain, I needed a solid framework to structure my learning. That’s when I decided to pursue Microsoft’s Security certification path — a roadmap designed to build skills layer by layer.&lt;/p&gt;

&lt;p&gt;I began with SC-900, Microsoft’s Security, Compliance, and Identity Fundamentals certification. It might seem basic to some, but for me, it laid the foundation. It helped me understand Microsoft’s security philosophy — from Zero Trust to compliance, governance, and risk. More importantly, it sparked the desire to go deeper.&lt;/p&gt;

&lt;p&gt;Then came SC-300, the Identity and Access Administrator certification. This is where things got technical. I immersed myself in managing Azure Active Directory, identity protection, multifactor authentication, B2B/B2C identities, conditional access, and secure hybrid identity strategies. It wasn’t easy. There were long nights, failed labs, and countless retries — but I pushed through. I didn’t just want to pass — I wanted to master it.&lt;/p&gt;

&lt;p&gt;And then, finally, SC-100 — the Cybersecurity Architect Expert. The title alone was intimidating. This exam expects you to think like a strategist, an architect, and a leader — all at once. It required me to bring together everything I had learned before, and add more. Designing security operations, managing regulatory compliance, leading risk assessments, securing hybrid and multi-cloud environments, implementing end-to-end Zero Trust — this was no joke.&lt;/p&gt;

&lt;p&gt;But I was ready. Because by now, it wasn’t just about certifications. It was about becoming the kind of professional who can lead organizations through secure digital transformation. It was about proving to myself that I could handle the pressure, own the responsibility, and live up to the title of 'Architect'.&lt;/p&gt;

&lt;p&gt;When I saw the 'Pass' result — I froze. Not because I doubted myself, but because the entire journey flashed before my eyes. Every lecture, every lab, every line of notes — it all came together in that one moment.&lt;/p&gt;

&lt;p&gt;What did I learn? That persistence pays off. That growth is never linear. That you don’t need to rush — you just need to move with purpose. And that if you dream of being at the top, you have to start at the bottom and climb intentionally.&lt;/p&gt;

&lt;p&gt;To anyone reading this — whether you’re just starting with SC-900 or aiming directly for SC-100 — know this: the journey is worth it. Every step teaches you something new. Stay consistent. Stay hungry. And never stop learning.&lt;/p&gt;

&lt;p&gt;Thanks to Allah SWT for the strength and clarity. Thanks to my mentors, peers, and the Microsoft community for the guidance and support. And now — time to apply everything in the real world and help organizations build security by design.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Teaching AI in 2025: Why We Must Include Its Financial Reality</title>
      <dc:creator>Hafiz Muhammad Attaullah</dc:creator>
      <pubDate>Tue, 15 Apr 2025 09:01:07 +0000</pubDate>
      <link>https://dev.to/attaullahshafiq10/teaching-ai-in-2025-why-we-must-include-its-financial-reality-139b</link>
      <guid>https://dev.to/attaullahshafiq10/teaching-ai-in-2025-why-we-must-include-its-financial-reality-139b</guid>
      <description>&lt;p&gt;Just wrapped up a thought-provoking session with leaders from academia and the cloud industry — diving deep into AI, R&amp;amp;D, and the economics behind it all. One of the most important and sobering takeaways? Despite all the hype, most AI companies aren't actually making money — and the only real winners so far are those who power the infrastructure, not those building the models.&lt;/p&gt;

&lt;p&gt;We discussed how companies like OpenAI are currently on track to spend $9 billion in 2024 while making just $4 billion, with the bulk of their revenue going straight into compute costs. Even paying customers reportedly cost the company more than they bring in. Similarly, Anthropic, backed by giants like Amazon and Google, lost over $5.6 billion last year while generating under a billion in revenue. Stability AI, once a rising star, has faced funding challenges and leadership turbulence. And even newer entrants like Perplexity, despite high valuations, only brought in $56 million last year and remain unprofitable.&lt;/p&gt;

&lt;p&gt;In stark contrast, Nvidia, a hardware company rather than an AI startup, is thriving. In Q4 of FY24 alone, it reported $22.1 billion in revenue and $12.3 billion in profit, mostly driven by surging demand for its AI-optimized GPUs. Companies like OpenAI, Anthropic, and major cloud providers (AWS, Azure, Google Cloud) are essentially building their entire infrastructures on Nvidia’s chips — making it the backbone of this AI boom.&lt;/p&gt;

&lt;p&gt;What’s even more concerning is the broader industry picture. Microsoft and Google are pouring tens of billions into AI infrastructure — yet their generative AI products like Copilot and Gemini have relatively small user bases compared to their traditional offerings. Many of these tools are being pushed into enterprise suites more out of pressure to “look futuristic” than real customer demand. Meanwhile, a staggering portion of AI revenue is tied up in subscriptions and cloud credits, not sustainable business models.&lt;/p&gt;

&lt;p&gt;So what does all of this mean for us — as educators, researchers, and cloud service providers? It’s clear we need to start preparing students and professionals not just to build and use AI, but to deeply understand the economics behind it, the hardware-software balance, and what it truly means to create scalable, sustainable, and valuable technology. The hype is loud — but the numbers are louder.&lt;/p&gt;

&lt;p&gt;This conversation isn’t over. In fact, it’s just beginning.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Truffle Security: Enhancing Burp Suite with Automated Secret Detection</title>
      <dc:creator>Hafiz Muhammad Attaullah</dc:creator>
      <pubDate>Thu, 13 Mar 2025 18:04:39 +0000</pubDate>
      <link>https://dev.to/attaullahshafiq10/truffle-security-enhancing-burp-suite-with-automated-secret-detection-19cd</link>
      <guid>https://dev.to/attaullahshafiq10/truffle-security-enhancing-burp-suite-with-automated-secret-detection-19cd</guid>
      <description>&lt;h2&gt;
  
  
  &lt;strong&gt;Introduction&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;As the cybersecurity landscape continues to evolve, security professionals and developers face an ongoing challenge: identifying and mitigating exposed secrets in web applications. Hardcoded credentials, API keys, and sensitive tokens are common vulnerabilities that, if leaked, can lead to severe security breaches.  &lt;/p&gt;

&lt;p&gt;To address this issue, &lt;strong&gt;Truffle Security&lt;/strong&gt;, a Burp Suite extension, provides an automated and efficient way to detect and manage secrets embedded in web applications. This tool helps security professionals streamline their assessments, ensuring that sensitive data is identified and mitigated before it can be exploited by attackers.  &lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;What is Truffle Security?&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Truffle Security is a &lt;strong&gt;Burp Suite extension&lt;/strong&gt; that integrates seamlessly into security testing workflows. It is designed to scan for exposed secrets within web traffic, helping users identify security risks quickly and efficiently. With its &lt;strong&gt;automation capabilities and customizable detection rules&lt;/strong&gt;, Truffle Security is a valuable tool for penetration testers, bug bounty hunters, and security researchers.  &lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Key Features&lt;/strong&gt;
&lt;/h2&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;1. Automated Secret Detection&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Truffle Security is equipped with powerful detection algorithms that scan HTTP requests, responses, and other Burp Suite interactions for &lt;strong&gt;exposed credentials, API keys, tokens, and other sensitive data&lt;/strong&gt;. This eliminates the need for manual inspection, saving time and improving accuracy.  &lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;2. Seamless Integration with Burp Suite&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;As a &lt;strong&gt;Burp Suite extension&lt;/strong&gt;, Truffle Security works within the Burp Extender tool. This integration allows users to leverage its scanning capabilities directly within their &lt;strong&gt;Burp Suite security assessments&lt;/strong&gt;, without the need for external tools or configurations.  &lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;3. Customizable Detection Rules&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Security professionals can fine-tune Truffle Security by defining custom rules to detect &lt;strong&gt;specific types of secrets&lt;/strong&gt; based on their unique security needs. This ensures that the extension can be adapted to different application environments and threat models.  &lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;4. Open-Source and Community-Driven&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Truffle Security’s &lt;strong&gt;source code is available on GitHub&lt;/strong&gt;, allowing developers and researchers to review, modify, and contribute to its continuous improvement. This transparency ensures that the extension remains up to date with evolving security challenges.  &lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;5. Efficient and Lightweight&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Unlike many security tools that introduce performance bottlenecks, Truffle Security is designed to be &lt;strong&gt;lightweight and efficient&lt;/strong&gt;. It &lt;strong&gt;does not significantly impact Burp Suite’s memory or CPU usage&lt;/strong&gt;, making it ideal for real-time security assessments.  &lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;How to Install and Use Truffle Security&lt;/strong&gt;
&lt;/h2&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Installation via the BApp Store&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Truffle Security can be installed &lt;strong&gt;directly from Burp Suite’s BApp Store&lt;/strong&gt; using the &lt;strong&gt;Burp Extender tool&lt;/strong&gt;. Here’s how:  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Open &lt;strong&gt;Burp Suite&lt;/strong&gt;.
&lt;/li&gt;
&lt;li&gt;Navigate to &lt;strong&gt;Extender &amp;gt; BApp Store&lt;/strong&gt;.
&lt;/li&gt;
&lt;li&gt;Search for &lt;strong&gt;Truffle Security&lt;/strong&gt;.
&lt;/li&gt;
&lt;li&gt;Click &lt;strong&gt;Install&lt;/strong&gt; and follow the on-screen instructions.
&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Offline Installation&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;If you prefer &lt;strong&gt;offline installation&lt;/strong&gt;, you can download the extension from the &lt;a href="https://portswigger.net/bappstore" rel="noopener noreferrer"&gt;BApp Store&lt;/a&gt; and manually import it into &lt;strong&gt;Burp Suite’s Extender module&lt;/strong&gt;.  &lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Using Truffle Security in Burp Suite&lt;/strong&gt;
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Enable the Extension&lt;/strong&gt; – Once installed, ensure Truffle Security is enabled in the &lt;strong&gt;Burp Extender settings&lt;/strong&gt;.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Configure Detection Rules&lt;/strong&gt; – Customize the extension’s &lt;strong&gt;secret detection rules&lt;/strong&gt; based on your specific security requirements.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Start Scanning&lt;/strong&gt; – Run security assessments, and Truffle Security will automatically scan for exposed credentials within &lt;strong&gt;HTTP requests, responses, and other web traffic&lt;/strong&gt;.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Review and Mitigate Findings&lt;/strong&gt; – The tool will highlight &lt;strong&gt;potential security risks&lt;/strong&gt;, allowing users to take necessary actions to mitigate them.
&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;System Impact and Performance&lt;/strong&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Overall System Impact:&lt;/strong&gt; Minimal
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Memory Usage:&lt;/strong&gt; Low
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CPU Usage:&lt;/strong&gt; Low
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Scanner Performance:&lt;/strong&gt; Does not introduce noticeable slowdowns
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Truffle Security is &lt;strong&gt;optimized for efficiency&lt;/strong&gt;, ensuring that security professionals can conduct assessments &lt;strong&gt;without compromising system performance&lt;/strong&gt;.  &lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Important Disclaimer&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Truffle Security is developed by &lt;strong&gt;third-party contributors&lt;/strong&gt;, and while it is a powerful tool, &lt;strong&gt;PortSwigger Web Security does not provide any warranties regarding its quality or effectiveness&lt;/strong&gt;. Users should evaluate and test the extension within their security environments before relying on it for critical assessments.  &lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Conclusion&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Truffle Security is a &lt;strong&gt;valuable addition to any security professional’s toolkit&lt;/strong&gt;, offering &lt;strong&gt;automated secret detection, Burp Suite integration, and customizable rules&lt;/strong&gt; to improve &lt;strong&gt;web application security&lt;/strong&gt;. Whether you are a penetration tester, security researcher, or DevSecOps professional, this extension provides &lt;strong&gt;a fast and efficient way to identify and mitigate exposed credentials before attackers can exploit them&lt;/strong&gt;.  &lt;/p&gt;

&lt;p&gt;For more information, visit the &lt;a href="https://portswigger.net/bappstore" rel="noopener noreferrer"&gt;BApp Store&lt;/a&gt; or explore the source code on &lt;strong&gt;&lt;a href="https://github.com" rel="noopener noreferrer"&gt;GitHub&lt;/a&gt;&lt;/strong&gt;.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Worldwide Cybersecurity market summary Q1 2024</title>
      <dc:creator>Hafiz Muhammad Attaullah</dc:creator>
      <pubDate>Fri, 28 Jun 2024 04:53:27 +0000</pubDate>
      <link>https://dev.to/attaullahshafiq10/worldwide-cybersecurity-market-summary-q1-2024-ael</link>
      <guid>https://dev.to/attaullahshafiq10/worldwide-cybersecurity-market-summary-q1-2024-ael</guid>
      <description>&lt;p&gt;In today's rapidly evolving cybersecurity landscape, strategic partnerships and efficient distribution channels are more crucial than ever. With the majority of cybersecurity spending flowing through partners, understanding these dynamics can provide key insights into market trends and vendor strategies.&lt;/p&gt;

&lt;h2&gt;
  
  
  Overview of Cybersecurity Channel Spending
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;The majority (over 90%) of cybersecurity spending is routed through partners, indicating a strong reliance on the channel.&lt;/li&gt;
&lt;li&gt;Last quarter, the cybersecurity channel grew by 8.6%, amounting to US$18.5 billion.&lt;/li&gt;
&lt;li&gt;Channel-based spending on cybersecurity technology accounted for 91.6% of the total $20.3 billion market.&lt;/li&gt;
&lt;li&gt;According to Canalys data, 67.9% of the total cybersecurity market spending went through two-tier partners via distributors.&lt;/li&gt;
&lt;li&gt;One-tier partners represented 23.7% of the market, while direct sales accounted for the remaining 8.4%.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fit90bbn0b0gecipix2ch.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fit90bbn0b0gecipix2ch.jpeg" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Partner Updates from Leading Cybersecurity Vendors
&lt;/h2&gt;

&lt;h3&gt;
  
  
  CrowdStrike
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Entered into distributor agreements with SB&amp;amp;C in Japan and Ignition in the UK and the Nordics.&lt;/li&gt;
&lt;li&gt;Strengthened relationships with Global System Integrators (GSIs) such as HCLTech, TCS, Deloitte, EY, and Dell.&lt;/li&gt;
&lt;li&gt;These moves are expected to enhance CrowdStrike's market reach and integration capabilities.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Palo Alto Networks
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Enabled partners in the EMEA and APAC regions to sell its software through private listings on the AWS Marketplace.&lt;/li&gt;
&lt;li&gt;Leveraged the DSOR program in collaboration with Westcon-Comstor to streamline the process.&lt;/li&gt;
&lt;li&gt;This approach is aimed at simplifying procurement and expanding the sales channels for Palo Alto Networks' products.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  SentinelOne
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Expanded its distributor agreement with Exclusive Networks, giving partners access to its Extended Detection and Response (XDR) offering.&lt;/li&gt;
&lt;li&gt;Signed a deal with Sherweb, allowing SentinelOne products to be added to Sherweb’s marketplace for Managed Service Providers (MSPs).&lt;/li&gt;
&lt;li&gt;These expansions are intended to enhance the distribution and accessibility of SentinelOne’s advanced cybersecurity solutions.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Sophos
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Broadened its distributor relationship with Infinigate Group to include the UK.&lt;/li&gt;
&lt;li&gt;This expansion is set to improve Sophos’ market penetration and support capabilities within the region.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  ESET
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Updated its Partner Connect Program to include an annual rebate aimed at incentivizing renewals.&lt;/li&gt;
&lt;li&gt;Introduced a comprehensive 90-day onboarding and training program for new partners.&lt;/li&gt;
&lt;li&gt;These updates are designed to enhance partner engagement and drive sustained growth.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Zscaler
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Announced a strategic shift to an ecosystem model to evolve its partner strategy.&lt;/li&gt;
&lt;li&gt;The new model aims to expand the types of partners Zscaler engages with, fostering technology alliances, simplifying procurement processes, and encouraging collaborative efforts on customer projects.&lt;/li&gt;
&lt;li&gt;This evolution is expected to broaden Zscaler’s market impact and facilitate integrated cybersecurity solutions.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;The latest data and partner updates from leading cybersecurity vendors highlight the critical role of the channel in driving market growth. With the majority of cybersecurity spending going through partners, the strategic moves by vendors like CrowdStrike, Palo Alto Networks, SentinelOne, Sophos, ESET, and Zscaler demonstrate a strong commitment to enhancing their partner ecosystems and expanding their market reach. These efforts not only facilitate better distribution and sales but also foster innovation and collaboration within the cybersecurity industry.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>marketsummary</category>
      <category>attaullah</category>
    </item>
    <item>
      <title>Integrate DEV.to blogs to WordPress site</title>
      <dc:creator>Hafiz Muhammad Attaullah</dc:creator>
      <pubDate>Fri, 19 Apr 2024 08:26:04 +0000</pubDate>
      <link>https://dev.to/attaullahshafiq10/integrate-devto-blogs-to-wordpress-site-78c</link>
      <guid>https://dev.to/attaullahshafiq10/integrate-devto-blogs-to-wordpress-site-78c</guid>
      <description>&lt;p&gt;Hello community!&lt;/p&gt;

&lt;p&gt;I've been diving into WordPress over the past few months, and to test my knowledge so far, so developed a little widget-plugin. It's designed to display your DEV posts right on your WordPress sidebar!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Overview:&lt;/strong&gt;&lt;br&gt;
The Dev-to-WordPress plugin is a simple yet effective tool for integrating your articles from DEV.to into your WordPress website. Ideal for bloggers and developers eager to share their DEV.to content directly on their WordPress platforms, this plugin enhances content visibility and reader engagement.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key Features:&lt;/strong&gt;&lt;br&gt;
Widget Integration: Effortlessly showcase your latest DEV.to articles using a customizable sidebar widget. This feature can be added to any widget area supported by your WordPress theme, ensuring a smooth integration with your existing site layout.&lt;br&gt;
Shortcode Capability: For those times when you need to spotlight a specific post within your WordPress content, the Dev-to-WordPress plugin provides a handy shortcode feature. This allows for the embedding of any DEV.to post directly into your pages or posts with ease.&lt;br&gt;
Usage:&lt;/p&gt;

&lt;p&gt;Widget:&lt;br&gt;
The Dev-to-WordPress sidebar widget serves as a gateway to your DEV.to blog posts. Once set up, it displays the latest articles linked to your DEV.to user profile. To implement this widget:&lt;/p&gt;

&lt;p&gt;Head to the Widgets section under the Appearance menu in your WordPress admin panel.&lt;br&gt;
Drag the Dev-to-WordPress widget to any widget area your theme supports.&lt;br&gt;
Enter your DEV.to username in the widget settings and save. Your latest posts will then automatically appear in the designated widget area.&lt;/p&gt;

&lt;p&gt;Shortcode:&lt;br&gt;
To embed a specific DEV.to post within your site's content, use the following shortcode method:&lt;/p&gt;

&lt;p&gt;Insert the shortcode below in the WordPress editor at your desired location:&lt;/p&gt;

&lt;p&gt;&lt;code&gt;[devtowordpress post="https://dev.to/username/post-url-example"]&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Substitute "&lt;a href="https://dev.to/username/post-url-example"&gt;https://dev.to/username/post-url-example&lt;/a&gt;" with the actual URL of the DEV.to post you wish to display.&lt;/p&gt;

&lt;p&gt;Technical Note:&lt;br&gt;
As DEV.to does not currently offer an API, the plugin works by making requests to a hardcoded URL to fetch the content. This method ensures that your WordPress site can display the latest posts without direct API support.&lt;/p&gt;

&lt;p&gt;Download and Installation:&lt;br&gt;
For the latest version of the Dev-to-WordPress plugin:&lt;/p&gt;

&lt;p&gt;Visit the official plugin page and look for the "Releases" section.&lt;br&gt;
Download the plugin as a .zip file from &lt;a href="https://github.com/attaullahshafiq10/dev-wordpress/releases/"&gt;&lt;strong&gt;this recent release&lt;/strong&gt;&lt;/a&gt;.&lt;br&gt;
Installation:&lt;br&gt;
Log into your WordPress admin panel.&lt;br&gt;
Navigate to Plugins &amp;gt; Add New and select the 'Upload Plugin' button.&lt;br&gt;
Upload the downloaded .zip file and select 'Install Now'.&lt;br&gt;
Once installed, activate the plugin through the 'Plugins' menu in WordPress.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl07mtt1srr0z366d01pu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl07mtt1srr0z366d01pu.png" alt="Image description" width="630" height="232"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Final Remarks:&lt;br&gt;
The Dev-to-WordPress plugin is an excellent resource for developers and content creators who actively use DEV.to and WordPress. It facilitates seamless integration of DEV.to content into WordPress sites, promoting consistency across your online platforms, enhancing user engagement, and simplifying content management. Whether you're a seasoned blogger or a budding developer, this plugin is a valuable addition to your WordPress toolkit.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>devtowordpress</category>
      <category>webdev</category>
      <category>attaullah</category>
    </item>
    <item>
      <title>Delay-Based Attack Payload</title>
      <dc:creator>Hafiz Muhammad Attaullah</dc:creator>
      <pubDate>Fri, 19 Apr 2024 07:42:35 +0000</pubDate>
      <link>https://dev.to/attaullahshafiq10/delay-based-attack-payload-1ilo</link>
      <guid>https://dev.to/attaullahshafiq10/delay-based-attack-payload-1ilo</guid>
      <description>&lt;p&gt;Example:&lt;br&gt;
&lt;strong&gt;&lt;a href="https://example%5B.%5Dcom/%E2%80%99XOR(SELECT(0)FROM(SELECT(SLEEP(2)))a)XOR%E2%80%99Z" rel="noopener noreferrer"&gt;https://example[.]com/’XOR(SELECT(0)FROM(SELECT(SLEEP(2)))a)XOR’Z&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4gprqrnb7a12gpolrso0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4gprqrnb7a12gpolrso0.png" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fny8jdxvgyt8y83d4n1jr.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fny8jdxvgyt8y83d4n1jr.png" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fczppwuygpjqrtedskcic.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fczppwuygpjqrtedskcic.png" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In the realm of cybersecurity and web application security testing, SQL injection (SQLi) remains a critical concern, posing significant risks to data integrity and system security. This writeup delves into a specific SQL injection technique aimed at causing delays in website responses, highlighting its methodology, potential impact, and mitigation strategies.&lt;/p&gt;

&lt;p&gt;The provided payload, ‘XOR(SELECT(0)FROM(SELECT(SLEEP(2)))a)XOR’Z’, serves as an example of a delay-based SQL injection attack. Let’s dissect the methodology and components of this payload:&lt;/p&gt;

&lt;p&gt;XOR Operator Usage: The ‘XOR’ operator, which stands for “exclusive or,” is utilized in SQL injection to manipulate query logic and evade input sanitization mechanisms. By strategically placing XOR within the payload, attackers attempt to alter the query’s behavior and inject malicious code.&lt;br&gt;
Subquery with Sleep Function: The payload contains a subquery ‘SELECT(0)FROM(SELECT(SLEEP(2)))a’ designed to execute a sleep function for 2 seconds. This sleep function introduces an intentional delay in the query execution, which can be leveraged by attackers to detect SQL injection vulnerabilities and assess the system’s responsiveness.&lt;br&gt;
Payload Termination: The payload concludes with ‘XOR’Z’, which aims to terminate the injected SQL code and prevent syntax errors or unintended behavior in the original query. Proper payload termination is crucial for maintaining attack stealth and minimizing the risk of detection.&lt;br&gt;
It’s imperative to approach SQL injection testing and security assessments ethically and responsibly. Unauthorized or malicious exploitation of vulnerabilities can lead to legal consequences and compromise system integrity.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Mitigation strategies for defending against SQL injection attacks include:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Input Validation: Implement strict input validation mechanisms to sanitize user inputs and prevent malicious SQL code injection.&lt;br&gt;
Parameterized Queries: Utilize parameterized queries or prepared statements in database interactions to separate data from SQL commands, reducing the risk of injection attacks.&lt;br&gt;
Web Application Firewalls (WAFs): Deploy WAFs with SQL injection detection capabilities to monitor and block suspicious requests before reaching the application server.&lt;br&gt;
Regular Security Audits: Conduct regular security audits and vulnerability assessments to identify and remediate SQL injection vulnerabilities proactively.&lt;br&gt;
So, while the delay-based SQL injection attack technique showcases vulnerabilities in web applications, it underscores the importance of robust security practices, continuous monitoring, and collaboration between security professionals and developers to fortify systems against evolving cyber threats.&lt;/p&gt;

&lt;p&gt;Regards,&lt;/p&gt;

&lt;p&gt;Hafiz Muhammad Attaullah&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>cybersecurity</category>
      <category>sqli</category>
    </item>
    <item>
      <title>Deletion of Data = Integrity Impact, Deletion of Data Availability Impact</title>
      <dc:creator>Hafiz Muhammad Attaullah</dc:creator>
      <pubDate>Fri, 29 Mar 2024 00:35:36 +0000</pubDate>
      <link>https://dev.to/attaullahshafiq10/deletion-of-data-integrity-impact-deletion-of-data-availability-impact-147l</link>
      <guid>https://dev.to/attaullahshafiq10/deletion-of-data-integrity-impact-deletion-of-data-availability-impact-147l</guid>
      <description>&lt;p&gt;Does Data Deletion impact Availability?&lt;/p&gt;

&lt;p&gt;Picture this scenario:&lt;br&gt;
You uncover a vulnerability that would allow an attacker to delete all files in the web server’s root directory.&lt;/p&gt;

&lt;p&gt;How would you rate the Availability metric for this vulnerability on the CVSS calculator?&lt;/p&gt;

&lt;p&gt;High? Low? None?&lt;/p&gt;

&lt;p&gt;If you would have asked this question to me a few years ago, I would have answered: &lt;/p&gt;

&lt;p&gt;High, isn’t it obvious?&lt;br&gt;
This vulnerability allows an attacker to delete all files from the web server’s root directory. This would make the website unusable for other users. Hence, “High Impact” on availability.&lt;/p&gt;

&lt;p&gt;However, let's read the definition of the Availability metric in the CVSS specification:&lt;/p&gt;

&lt;p&gt;While the Confidentiality and Integrity impact metrics apply to the loss of confidentiality or integrity of data (e.g., information, files) used by the system, this metric refers to the loss of availability of the impacted system itself, such as a networked service (e.g., web, database, email).&lt;br&gt;
&lt;a href="https://lnkd.in/exVsP3BP"&gt;https://lnkd.in/exVsP3BP&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In simple terms, it means “Availability” in CVSS calculator is the availability of the underlying system/service, not the availability of data.&lt;/p&gt;

&lt;p&gt;Now, let’s look back at the above web server file deletion example and ask ourselves this question:&lt;/p&gt;

&lt;p&gt;Does deleting all files in the website’s root directory impact the availability of the web “service”?&lt;/p&gt;

&lt;p&gt;It doesn’t. The web service is still running. The only difference is that it is now not serving the intended files. Hence, this vulnerability does not affect Availability, but it impacts Integrity.&lt;/p&gt;

&lt;p&gt;So, remember this:&lt;br&gt;
Deletion of Data = Integrity Impact &lt;br&gt;
Deletion of Data ≠ Availability Impact&lt;/p&gt;

&lt;p&gt;This a very common misconception. So common is this, that First[.]org has a section dedicated clarifying this in the CVSS user guide:&lt;br&gt;
&lt;a href="https://lnkd.in/eYYKdrsT"&gt;https://lnkd.in/eYYKdrsT&lt;/a&gt;&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;
✍️ What are your thoughts?
♻️ Reshare if this hits.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

</description>
      <category>cybersecurity</category>
      <category>integrity</category>
      <category>availability</category>
      <category>sql</category>
    </item>
    <item>
      <title>Cybersecurity Budget Analysis</title>
      <dc:creator>Hafiz Muhammad Attaullah</dc:creator>
      <pubDate>Fri, 29 Mar 2024 00:33:54 +0000</pubDate>
      <link>https://dev.to/attaullahshafiq10/cybersecurity-budget-analysis-e9j</link>
      <guid>https://dev.to/attaullahshafiq10/cybersecurity-budget-analysis-e9j</guid>
      <description>&lt;p&gt;🔒 Unraveling the Complexities of Cybersecurity Budget Analysis 🔒&lt;/p&gt;

&lt;p&gt;In the realm of cybersecurity, discussions surrounding budget allocation can be fraught with complexities. While some rely on industry benchmarks, I urge you to take a step back and consider a more comprehensive approach. Let's delve into a different statistical analysis of cybersecurity budgets, shedding light on why it's crucial to look beyond simple percentages.&lt;/p&gt;

&lt;p&gt;1️⃣ Risk-Based Budgeting: Rather than fixating on arbitrary percentages, a more effective approach is to adopt risk-based budgeting. Start by evaluating your organization's unique risk landscape. Consider the potential impact of cyber threats, the likelihood of their occurrence, and the value of the assets at stake. This analysis allows you to prioritize your cybersecurity investments and allocate resources where they are most needed.&lt;/p&gt;

&lt;p&gt;2️⃣ Cost of a Breach: Understanding the cost of a potential data breach is a critical factor in determining your cybersecurity budget. Conduct a thorough assessment of the potential financial and reputational damage that a security incident could inflict on your organization. By quantifying the potential costs, you can allocate funds to preventive measures, incident response capabilities, and cyber insurance accordingly.&lt;/p&gt;

&lt;p&gt;3️⃣ Maturity Model Assessment: Consider adopting a maturity model assessment, such as the NIST Cybersecurity Framework or the ISO 27001 standard. These frameworks provide a structured approach to evaluate your organization's cybersecurity posture and identify areas that require investment. By conducting a maturity assessment, you can align your budget with specific improvement goals and measure progress over time.&lt;/p&gt;

&lt;p&gt;4️⃣ Return on Investment (ROI): It's crucial to evaluate the return on investment for your cybersecurity initiatives. This entails assessing the potential benefits and impact of each investment, such as reduced risk exposure, improved incident response capabilities, and enhanced regulatory compliance. By quantifying the expected ROI, you can make informed decisions about allocating resources to initiatives that deliver the most value to your organization.&lt;/p&gt;

&lt;p&gt;5️⃣ Continuous Monitoring and Adjustment: Cybersecurity is a dynamic field, and your budget should reflect that. Implement a system of continuous monitoring and adjustment, where you regularly evaluate the effectiveness of your investments and make adjustments based on emerging threats, technological advancements, and changes in your organization's risk profile. This proactive approach ensures that your budget remains aligned with evolving cybersecurity needs.&lt;/p&gt;

&lt;p&gt;Remember, statistical analysis of cybersecurity budgets should go beyond mere percentages. Embrace risk-based budgeting, factor in the cost of potential breaches, leverage maturity models, evaluate ROI, and maintain a flexible mindset through continuous monitoring and adjustment.&lt;/p&gt;

&lt;p&gt;By adopting this holistic approach, you can develop a cybersecurity budget that aligns with your organization's specific risks, goals, and priorities. It enables you to make informed decisions that maximize the effectiveness of your cybersecurity investments and ultimately protect your organization from ever-evolving cyber threats.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Incident Response For Common Attack Types</title>
      <dc:creator>Hafiz Muhammad Attaullah</dc:creator>
      <pubDate>Wed, 11 Oct 2023 17:43:42 +0000</pubDate>
      <link>https://dev.to/attaullahshafiq10/incident-response-for-common-attack-types-4pdb</link>
      <guid>https://dev.to/attaullahshafiq10/incident-response-for-common-attack-types-4pdb</guid>
      <description>&lt;p&gt;Incident Response For Common Attack Types&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Brute Forcing&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Details:&lt;br&gt;
Attacker trying to guess a password by attempting several different passwords&lt;br&gt;
Threat Indicators:&lt;br&gt;
Multiple login failures in a short period of time&lt;br&gt;
Where To Investigate:&lt;br&gt;
• Active directory logs&lt;br&gt;
• Application logs&lt;br&gt;
• Operational system logs&lt;br&gt;
• Contact user&lt;br&gt;
Possible Actions:&lt;br&gt;
If not legit action, disable the account and investigate/block attacker&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Botnets&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Details:&lt;br&gt;
Attackers are using the victim server to perform DDoS attacks or other malicious activities&lt;br&gt;
Threat Indicators:&lt;br&gt;
• Connection to suspicious IPs&lt;br&gt;
• Abnormal high volume of network traffic&lt;br&gt;
Where To Investigate:&lt;br&gt;
• Network traffic&lt;br&gt;
• OS logs (new processes)&lt;br&gt;
• Contact server owner&lt;br&gt;
• Contact support team&lt;br&gt;
Possible Actions:&lt;br&gt;
If confirmed:&lt;br&gt;
• Isolate the server&lt;br&gt;
• Remove malicious processes&lt;br&gt;
• Patch the vulnerability utilized for infection&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Ransomware&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Details:&lt;br&gt;
A type of malware that encrypts files and requests a ransom (money payment) from the user to decrypt the files&lt;br&gt;
Threat Indicators:&lt;br&gt;
• Anti-Virus alerts&lt;br&gt;
• Connection to suspicious Ips&lt;br&gt;
Where To Investigate:&lt;br&gt;
• AV logs&lt;br&gt;
• OS logs&lt;br&gt;
• Account logs&lt;br&gt;
• Network traffic&lt;br&gt;
Possible Actions:&lt;br&gt;
• Request AV checks&lt;br&gt;
• Isolate the machine&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Data Exfiltration&lt;br&gt;
Details:&lt;br&gt;
The attacker (or rogue employee) exfiltrates data to external sources&lt;br&gt;
Threat Indicators:&lt;br&gt;
• Abnormal high network traffic&lt;br&gt;
• Connection to cloud -storage solutions (Dropbox, Google Cloud)&lt;br&gt;
• Unusual USB Sticks&lt;br&gt;
Where To Investigate:&lt;br&gt;
• Network traffic&lt;br&gt;
• Proxy logs&lt;br&gt;
• OS logs&lt;br&gt;
Possible Actions:&lt;br&gt;
• If employee: Contact manager, perform full forensics&lt;br&gt;
• If external threat: Isolate the machine, disconnect from network&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Compromised Account&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Details:&lt;br&gt;
Attackers get access to one account (via social engineering or any other method)&lt;br&gt;
Threat Indicators:&lt;br&gt;
• Off-hours account logins&lt;br&gt;
• Account group changes&lt;br&gt;
• Abnormal high network traffic&lt;br&gt;
Where To Investigate:&lt;br&gt;
• Active directory logs&lt;br&gt;
• OS logs&lt;br&gt;
• Network traffic&lt;br&gt;
• Contact user for clarifications&lt;br&gt;
Possible Actions:&lt;br&gt;
If confirmed:&lt;br&gt;
• Disable account&lt;br&gt;
• Password changes&lt;br&gt;
• Forensic investigations&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Denial Of Service (Dos/DDoS)&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Details:&lt;br&gt;
When attacker can cause interference in a system by exploiting DoS vulnerabilities or by generating a high volume of traffic&lt;br&gt;
Threat Indicators:&lt;br&gt;
Abnormal high network traffic in public facing servers&lt;br&gt;
Where To Investigate:&lt;br&gt;
• Network traffic&lt;br&gt;
• Firewall logs&lt;br&gt;
• OS logs&lt;br&gt;
Possible Actions:&lt;br&gt;
• If DoS due to vulnerabilities: Contact the patching team for remediation&lt;br&gt;
• If DDoS due to network traffic: Contact network Support or ISP&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Don't go straight into cyber</title>
      <dc:creator>Hafiz Muhammad Attaullah</dc:creator>
      <pubDate>Fri, 08 Sep 2023 17:48:04 +0000</pubDate>
      <link>https://dev.to/attaullahshafiq10/dont-go-straight-into-cyber-16kc</link>
      <guid>https://dev.to/attaullahshafiq10/dont-go-straight-into-cyber-16kc</guid>
      <description>&lt;p&gt;When I look back on all the things I've learned just to get to the point where penetration testing made sense for me, I can see now why I was told SOOO many times 'don't go straight into cyber.'&lt;/p&gt;

&lt;p&gt;But, and let's be real here... my inner monologue was:&lt;/p&gt;

&lt;p&gt;"Help desk sucks, and I don't want to be forced into systems administration because that's even worse. Networking? Oh man that's simple and the only reason it seems hard is that it's so boring. Coding? That stuff makes me want to punch a wall it's so hard (I'm talking production level code)."&lt;/p&gt;

&lt;p&gt;I JUST WANTED TO BE IN SECURITY... and in my case I love popping boxes and finding vulnerabilities in code.&lt;/p&gt;

&lt;p&gt;Here's the thing though, while prepping for my OSCP I have utilized sysadmin while setting up VMs, setting up MS Server, and a whole lot while interacting with Linux.&lt;/p&gt;

&lt;p&gt;My web dev skills have come into play while analyzing code and vulnerabilities in web apps... and at various points while setting up web servers to host client code for analysis.&lt;/p&gt;

&lt;p&gt;Networking... guys that comes up all over the place and I'm not kidding about that at all. Do not skip networking! The CCNA will SAVE YOUR LIFE!&lt;/p&gt;

&lt;p&gt;What I'm saying is that unfortunately for the new people I'm doubling down on the statements put forward by others saying you can't go straight into cyber... at least you shouldn't. And you DEFINITELY can't go straight into pentesting!&lt;/p&gt;

&lt;p&gt;In today's job market especially, I'd be looking at networking combined with cloud expertise as a staging ground for a career in cyber security.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>webdev</category>
      <category>programming</category>
    </item>
    <item>
      <title>Can You Trust AES Encryption?</title>
      <dc:creator>Hafiz Muhammad Attaullah</dc:creator>
      <pubDate>Sat, 08 Jul 2023 06:41:20 +0000</pubDate>
      <link>https://dev.to/attaullahshafiq10/can-you-trust-aes-encryption-31gf</link>
      <guid>https://dev.to/attaullahshafiq10/can-you-trust-aes-encryption-31gf</guid>
      <description>&lt;p&gt;In this article, I will not break the AES method (as it has yet to be broken), but breach its integrity. This is because some modes of AES are not good at handling the integrity of the message. The fast stream cipher modes, such as with CTR and GCM are especially prone to this lack of integrity checking, as it is easy to pick off the characters to target.&lt;/p&gt;

&lt;p&gt;As a magic trick, I will take the encrypted message of:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Pay Bob 1 dollar
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;and then flip a few bits to give the ciphertext for:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Pay Bob 2 dollar
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;In ASCII, a ‘1’ is 0110001, and a ‘2’ is 0110010, and so all I have to do, is to find the place of the character I want to flip in the ciphertext, and then flip the two least significant bits.&lt;/p&gt;

&lt;p&gt;First, I will encrypt the message using AES CTR mode — a fast stream cipher mode with AES — and use a passphrase of “Bob123”. The encryption key will be generated using PBKDF2:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;$ echo "Pay Bob 1 dollar" | openssl enc -k bob123 -e -aes-128-ctr -pbkdf2 &amp;gt;ciphertext
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The ciphertext will be in a binary form:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;$ cat ciphertext
Salted__?T????i??k=e??n??.3?%
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;We can then use xxd to convert this binary format into a ciphertext so that we can edit the ciphertext:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;$ xxd ciphertext &amp;gt; data
$ cat data
00000000: 5361 6c74 6564 5f5f f354 1385 819d f1a3  Salted__.T......
00000010: 69fa 816b 3d65 80ed 136e a405 f02e 3307  i..k=e...n....3.
00000020: e6 
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;AES CTR is a stream mode, so it is easy to find all of the characters in the cipher, as they map straight to their position in the plaintext. Now, we ignore that last byte (e6) and count back the number of characters to the ciphertext of ‘1’. In this case, it is eight characters from the end, so let’s use change the ciphertext to:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;(base) billbuchanan@ASecuritySite ~ % cat data
00000000: 5361 6c74 6564 5f5f f354 1385 819d f1a3  Salted__.T......
00000010: 69fa 816b 3d65 80ed 106e a405 f02e 3307  i..k=e...n....3.
00000020: e6 
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;In this case, I have changed “136e” to “106e”, and only flipped two bits (from 0010011 to 0010000, and which should change a ‘1’ to a ‘2’ ). Now we will convert the cipher back into binary, and decrypt:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;% xxd -r data &amp;gt; ciphertext
% cat ciphertext
Salted__?T????i??k=e??n??.3?%
% cat ciphertext | openssl enc -k bob123 -d -aes-128-ctr -pbkdf2   
Pay Bob 2 dollar     
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;And magically, we have converted one dollar into two!!!!&lt;/p&gt;

&lt;p&gt;Why does this happen? Well, the integrity checking in OpenSSL is not very good, and it struggles to detect whether bits have been flipped in the cipher.&lt;/p&gt;

&lt;p&gt;Here is the demo:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://vimeo.com/manage/videos/843411936"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Overall, CTR and GCM are two of the fastest and widely used modes in AES. Their great advantage is that they convert the block mode into a stream cipher (and thus do not need padding and can be processed in parallel). They are only beaten for performance by ECB, and which has serious weaknesses (as it has no nonce input):&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--NVML56ZV--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/xlxk7ihg9zrsujg56rzg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--NVML56ZV--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/xlxk7ihg9zrsujg56rzg.png" alt="Image description" width="800" height="589"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If you are interested in the performance of AES modes, try here:&lt;br&gt;
&lt;a href="https://medium.com/asecuritysite-when-bob-met-alice/whats-the-fastest-symmetric-cipher-and-mode-3d6e77841c2b"&gt;https://medium.com/asecuritysite-when-bob-met-alice/whats-the-fastest-symmetric-cipher-and-mode-3d6e77841c2b&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>How does SecOps work with DevOps?</title>
      <dc:creator>Hafiz Muhammad Attaullah</dc:creator>
      <pubDate>Tue, 20 Jun 2023 17:58:01 +0000</pubDate>
      <link>https://dev.to/attaullahshafiq10/phow-does-secops-work-with-devops-2nie</link>
      <guid>https://dev.to/attaullahshafiq10/phow-does-secops-work-with-devops-2nie</guid>
      <description>&lt;p&gt;The level of competition driven by digital disruption is intense. Coping with the demand for application delivery life cycles measured in seconds — with shrinking resources and increased complexity — requires a new approach. To compete today, leaders are automating application delivery to operationalize their competitive advantage.&lt;/p&gt;

&lt;p&gt;Using a DevOps approach, companies can deliver applications faster, at a higher level of quality, and at a lower cost. In fact, a study by McKinsey found that companies that embrace an agile DevOps approach to development, testing, and operations see an 83 percent improvement in time to market, 90 percent faster updates to servers, and a near 50 percent reduction in handoffs per process.&lt;/p&gt;

&lt;p&gt;As organizations “shift left” (test early and often in the software development life cycle process) to improve agility, this naturally creates new challenges and exposes different bottlenecks in their DevOps processes. For example, compliance and security remains a manual, ad‐hoc activity at the end of a release, which forces tough decisions about risk acceptance versus costly late code fixes. Furthermore, cloud adoption and containerization introduce mode‐two (new and innovative) resources into these processes that create real security and compliance gaps that most organizations haven’t considered. Without a comprehensive compliance strategy that addresses these issues, organizations will eventually fall behind competitors and increase their risk of data breaches and ransomware.&lt;/p&gt;

&lt;p&gt;SecOps helps organizations gain a competitive advantage by increasing agility, while closing security and compliance gaps associated with the latest cloud and container technologies. A comprehensive SecOps program provides a unified view of compliance data collected across data center, cloud, and container resources that is analyzed against flexible predefined policies. Compliance checks can also be embedded directly in DevOps pipelines for instant feedback regarding go and no‐go decisions in the process.&lt;/p&gt;

</description>
      <category>secops</category>
      <category>devsecops</category>
      <category>devops</category>
      <category>cybersecurity</category>
    </item>
  </channel>
</rss>
