<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: FLO</title>
    <description>The latest articles on DEV Community by FLO (@hackh3rgr1fl0).</description>
    <link>https://dev.to/hackh3rgr1fl0</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F861638%2F6e3c2c73-a7fc-41ed-aa5d-bb1af9b523bb.jpg</url>
      <title>DEV Community: FLO</title>
      <link>https://dev.to/hackh3rgr1fl0</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/hackh3rgr1fl0"/>
    <language>en</language>
    <item>
      <title>Securing Endpoints Using Vulnerability Profiles</title>
      <dc:creator>FLO</dc:creator>
      <pubDate>Tue, 03 Jan 2023 00:00:30 +0000</pubDate>
      <link>https://dev.to/hackh3rgr1fl0/securing-endpoints-using-vulnerability-profiles-4fk8</link>
      <guid>https://dev.to/hackh3rgr1fl0/securing-endpoints-using-vulnerability-profiles-4fk8</guid>
      <description>&lt;p&gt;In this lab, I was able to secure an endpoint by blocking a PDF file with a Custom Vulnerability Object and Vulnerability Protection Profile. Palo Alto Networks Firewalls support the use&lt;br&gt;
of Custom Vulnerability Signatures that can be written with expression patterns to identify vulnerability exploits. Vulnerability Protection Profiles will stop any attempt to&lt;br&gt;
exploit system flaws so that unauthorized access cannot be gained to a targeted system.&lt;br&gt;&lt;br&gt;
&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/M1OGNSRerc8"&gt;
&lt;/iframe&gt;
&lt;br&gt;
In this video:&lt;br&gt;
&lt;strong&gt;• Install the latest Dynamic Updates of Antivirus&lt;/strong&gt;&lt;br&gt;
Dynamic Updates ensure policy enforcement on a Palo Alto Networks Firewall of new threat signatures and applications.&lt;br&gt;
&lt;strong&gt;• Install Manual Update of Applications and Threats&lt;/strong&gt;&lt;br&gt;
There are times when the Firewall may not have Internet access to perform a Dynamic Update. Applications and Threats will be updated via file that has been downloaded from the Palo Alto Networks Customer Support Portal.&lt;br&gt;
&lt;strong&gt;• Create a Custom Vulnerability Signature&lt;/strong&gt;&lt;br&gt;
Palo Alto Network Firewalls use Custom Vulnerability Signature to identify vulnerability exploits by writing a custom regular expression. The Firewall then looks for the custom-defined pattern within the network traffic and takes the necessary action to identify and stop the vulnerability exploit.&lt;br&gt;
&lt;strong&gt;• Clone a Vulnerability Protection Profile&lt;/strong&gt;&lt;br&gt;
Creating a customized profile, I'm able to maximize vulnerability-checking for traffic between trusted security zones, and maximize protection for traffic received from untrusted zones, such as the Internet. The strict profile shows the block response to all client and server critical, high, and medium severity events and uses the Default Action for low and informational vulnerability protection events.&lt;br&gt;
&lt;strong&gt;• Apply Custom Vulnerability Protection Profile to a Security Policy&lt;/strong&gt;&lt;br&gt;
Using Allow-Any security policy for enforcement on Custom Vulnerability Protection Profile and PDF Vulnerability Protection.&lt;br&gt;
&lt;strong&gt;• Commit and Test Vulnerability Protection&lt;/strong&gt;&lt;br&gt;
Attempting to download an infected PDF file and test the Vulnerability Protection. Next, verify in the Threat Logs of the Palo Alto Networks Firewall.&lt;br&gt;
&lt;em&gt;*** The site can't be reached because the connection was reset by the Firewall to stop the exploit.***&lt;/em&gt;&lt;/p&gt;

</description>
      <category>emptystring</category>
    </item>
    <item>
      <title>Stopping Reconnaissance Attacks</title>
      <dc:creator>FLO</dc:creator>
      <pubDate>Mon, 02 Jan 2023 21:16:45 +0000</pubDate>
      <link>https://dev.to/hackh3rgr1fl0/stopping-reconnaissance-attacks-362</link>
      <guid>https://dev.to/hackh3rgr1fl0/stopping-reconnaissance-attacks-362</guid>
      <description>&lt;p&gt;&lt;em&gt;Able to utilize Zone Protection profiles to provide additional protection for specific network zones to protect the zones from attack. Able to use Nmap on the client machine to perform reconnaissance attack. This will test the Zone Protection profiles of the Palo Alto Networks Firewalls.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/dNtVdOIP6Mo"&gt;
&lt;/iframe&gt;
&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;• Create a Zone Protection Profile&lt;/strong&gt;&lt;br&gt;
Zone Protection Profiles supplement additional protection between determined zones to protect the zones against attacks.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;• Apply the Zone Protection Profile to Zones and Commit&lt;/strong&gt;&lt;br&gt;
Using the Zone Protection Profile created to the inside, outside, and DMZ security zones. This helps control against network floods, reconnaissance, and other packet-based related attacks. Then commit changes into the Firewall.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;• Perform a Reconnaissance Attack on the DMZ Server&lt;/strong&gt;&lt;br&gt;
Using Nmap to perform reconnaissance attack on the DMZ server. Nmap is used to scan networks as a host detection tool for penetration testing and to visualize network vulnerabilities.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;• Monitor and Analyze the Threat Logs&lt;/strong&gt;&lt;br&gt;
able to analyze and monitor the Threat logs in the Palo Alto Networks Firewall.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;After an admin analyzes the logs present on the Firewall from&lt;br&gt;
the Nmap scan, the port scan activity is visible. If this had&lt;br&gt;
been a malicious hacker scanning the network, the threat logs would have alerted the admin. &lt;br&gt;
For this lab, the security policy is set to allow all traffic. That security policy setting most likely would not be utilized in a production environment. If the security policy would have been set to deny traffic, an alert would have been triggered by the Nmap scan but the scan traffic would not have been allowed between the zones.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>softwaredevelopment</category>
      <category>architecture</category>
    </item>
    <item>
      <title>Log Forwarding To Linux</title>
      <dc:creator>FLO</dc:creator>
      <pubDate>Mon, 02 Jan 2023 19:25:29 +0000</pubDate>
      <link>https://dev.to/hackh3rgr1fl0/log-forwarding-to-linux-5117</link>
      <guid>https://dev.to/hackh3rgr1fl0/log-forwarding-to-linux-5117</guid>
      <description>&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/XDs6NCLH6yM"&gt;
&lt;/iframe&gt;
&lt;/p&gt;

&lt;p&gt;In this video:&lt;br&gt;
&lt;strong&gt;- Configure Syslog Monitoring via Palo Alto Firewall&lt;/strong&gt;&lt;br&gt;
Syslog is a standard log transport mechanism that enables the aggregation of log data from different network devices - such as routers, firewalls, printers - from different vendors into a central repository for archiving, analysis, and reporting. &lt;br&gt;
Palo Alto Firewalls can forward every type of log they generate to an external Syslog server. Using TCP or SSL  for reliable and secure log forwarding, or UDP for non-secure forwarding.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;- Verify Syslog Forwarding&lt;/strong&gt;&lt;br&gt;
able to connect to the DMZ server and verify that the syslogs are being forwarded. Using Xfce Terminal, I was able to ping the DMZ server address by typing &lt;strong&gt;ping -c4 192.168.50.10.&lt;/strong&gt;&lt;br&gt;
Also using &lt;strong&gt;tail -f /var/log/messages&lt;/strong&gt; can connect the current file for any changes that are occurring. Which should show the date, source of the syslog data, and information about the traffic.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>socananlyst</category>
      <category>tech</category>
    </item>
    <item>
      <title>Analyzing Firewall Logs</title>
      <dc:creator>FLO</dc:creator>
      <pubDate>Mon, 02 Jan 2023 05:25:47 +0000</pubDate>
      <link>https://dev.to/hackh3rgr1fl0/analyzing-firewall-logs-1i9d</link>
      <guid>https://dev.to/hackh3rgr1fl0/analyzing-firewall-logs-1i9d</guid>
      <description>&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/aR33DY824WU"&gt;
&lt;/iframe&gt;
&lt;br&gt;
In this video, I was able to:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;- Generate Traffic to the Firewall&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;using a script on puTTY configuration window, I was able to load and open the traffic-generator and type in &lt;strong&gt;&lt;em&gt;sh /tg/malware.sh&lt;/em&gt;&lt;/strong&gt;. Which is able to generate test malware traffic to the Firewall so that you're able to see the malware traffic in the Firewall. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;-  Review Traffic in the Firewall Log&lt;/strong&gt;&lt;br&gt;
noticing the traffic from the firewall by clicking on monitor. You are able to notice the traffic under the Application column and see the traffic that is categorized as web-browsing. Also you can review the Detailed Log View window to see the source, destination.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>socanalyst</category>
      <category>tech</category>
    </item>
    <item>
      <title>Network Traffic Analysis</title>
      <dc:creator>FLO</dc:creator>
      <pubDate>Sat, 31 Dec 2022 05:30:42 +0000</pubDate>
      <link>https://dev.to/hackh3rgr1fl0/network-traffic-analysis-205o</link>
      <guid>https://dev.to/hackh3rgr1fl0/network-traffic-analysis-205o</guid>
      <description>&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/YAC1T7Dwvy8"&gt;
&lt;/iframe&gt;
&lt;br&gt;
In this lab, I: &lt;br&gt;
&lt;strong&gt;• Configured log forwarding on the firewall appliance&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;• Generate traffic&lt;/strong&gt;&lt;br&gt;
able to prepopulate the Firewall with log entries and usernames that can be observable and investigated.&lt;br&gt;
using an Xfce terminal, able to capture traffic packets to the Palo Alto Networks Firewall using &lt;strong&gt;sh /tg/traffic.sh&lt;/strong&gt;. &lt;br&gt;
Pushing malware packet captures to the Firewall using &lt;strong&gt;sh /tg/malware.sh&lt;/strong&gt;. &lt;br&gt;
&lt;strong&gt;• Test log forwarding&lt;/strong&gt;&lt;br&gt;
The firewall's log forwarding profile will also forward the log traffic to the DMZ server's syslog server for permanent storage and for further analysis to possibly include machine learning analysis (MLA).&lt;br&gt;
&lt;strong&gt;• Export the firewall appliances' traffic log as a csv file&lt;/strong&gt;&lt;br&gt;
able to forward my firewall's threat log to my DMZ server running syslog. Syslog is a standard log transport mechanism that enables the aggregation of log data from different network devices - such as routers, firewalls, printers- from different vendors into a central repository for archiving, analysis, and reporting. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;• Perform data analysis on the exported traffic csv file&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>javascript</category>
      <category>typescript</category>
      <category>discuss</category>
    </item>
    <item>
      <title>Spotify-clone</title>
      <dc:creator>FLO</dc:creator>
      <pubDate>Sat, 03 Sep 2022 04:57:55 +0000</pubDate>
      <link>https://dev.to/hackh3rgr1fl0/spotify-clone-4bak</link>
      <guid>https://dev.to/hackh3rgr1fl0/spotify-clone-4bak</guid>
      <description>&lt;p&gt;It has been a while since I have blogged but I have been busy working on myself and more clone apps to build. &lt;/p&gt;

&lt;p&gt;Loving React and JavaScript and thought to clone Spotify app. We all know and love Spotify. I love building apps that I love.&lt;/p&gt;

&lt;p&gt;This was extremely fun to create. I was high-key stressed but I believe once you are consistent in everything you do, you can achieve just about anything you desire.&lt;/p&gt;

&lt;p&gt;I finally completed my Spotify-clone app using React JS, NextJs, HTML, CSS, JavaScript, hosted on Firebase. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--_soW7rFY--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/djvyg4z7qvfgogvnmhy3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--_soW7rFY--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/djvyg4z7qvfgogvnmhy3.png" alt="Image description" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>react</category>
      <category>javascript</category>
      <category>typescript</category>
      <category>firebase</category>
    </item>
    <item>
      <title>Importing...</title>
      <dc:creator>FLO</dc:creator>
      <pubDate>Wed, 22 Jun 2022 12:32:32 +0000</pubDate>
      <link>https://dev.to/hackh3rgr1fl0/importing-225n</link>
      <guid>https://dev.to/hackh3rgr1fl0/importing-225n</guid>
      <description>&lt;p&gt;One of my favorite things to learn on React is importing. What is importing? Let me explain to you in simple terms. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--UJoOocAo--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/h9u98qvqba2ibn1yhoi9.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--UJoOocAo--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/h9u98qvqba2ibn1yhoi9.jpg" alt="Image description" width="500" height="323"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You may create a page and render it but if it is not imported, then your computer wouldn't know what you are trying to say. &lt;/p&gt;

&lt;p&gt;Let's say I have an &lt;strong&gt;App.js&lt;/strong&gt; as my main page. But I also created another component called &lt;strong&gt;NavTitle.js&lt;/strong&gt;. If I want to add all my work from &lt;strong&gt;NavTitle.js&lt;/strong&gt; to App.js, then I must import. &lt;br&gt;
Next, you are going to add where in the file NavTitle.js is located. &lt;br&gt;
Example: &lt;strong&gt;&lt;em&gt;import { NavTitle } from './NavTitle.js';&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;__Think of import as someone who is the life of the party that you just have to bring with you everywhere. _&lt;br&gt;
_&lt;/p&gt;

</description>
      <category>react</category>
      <category>softwareengineer</category>
      <category>coding</category>
      <category>import</category>
    </item>
    <item>
      <title>Destructuring Assignment</title>
      <dc:creator>FLO</dc:creator>
      <pubDate>Fri, 13 May 2022 12:40:54 +0000</pubDate>
      <link>https://dev.to/hackh3rgr1fl0/destructuring-assignment-1han</link>
      <guid>https://dev.to/hackh3rgr1fl0/destructuring-assignment-1han</guid>
      <description>&lt;p&gt;Completed my Destructuring assignment. I really enjoyed this lab because it was an easier way to pull out objects and my codes are a bit clearer. Below, I used different variables for this assignment, objects, arrays, and strings. It's an easy way to pick and choose the pieces of data I'd like to assign.&lt;br&gt;
JavaScript is a challenge but once you start noticing patterns, you start getting the hang of it.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--by8wkYWt--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/09qzulgxena74avphf4e.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--by8wkYWt--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/09qzulgxena74avphf4e.png" alt="Image description" width="800" height="426"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>javascript</category>
      <category>beginners</category>
      <category>programming</category>
    </item>
    <item>
      <title>Coding World</title>
      <dc:creator>FLO</dc:creator>
      <pubDate>Fri, 13 May 2022 12:36:30 +0000</pubDate>
      <link>https://dev.to/hackh3rgr1fl0/coding-world-3d75</link>
      <guid>https://dev.to/hackh3rgr1fl0/coding-world-3d75</guid>
      <description>&lt;p&gt;This was really great to create. I created a Tasklister Mini-Project for my cat LuLu. Haha! I built a function to-do list application that uses JavaScript to manipulate the DOM. I also used the &lt;strong&gt;Event.preventDefault()&lt;/strong&gt; method to suppress the default actions.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--N5mDr5kg--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/r6vpyrjm8grivv4bygtd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--N5mDr5kg--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/r6vpyrjm8grivv4bygtd.png" alt="Image description" width="800" height="458"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>javascript</category>
      <category>flatironschool</category>
      <category>coding</category>
      <category>developer</category>
    </item>
  </channel>
</rss>
