<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Aneesah</title>
    <description>The latest articles on DEV Community by Aneesah (@https_aneesah).</description>
    <link>https://dev.to/https_aneesah</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1545593%2F8b2a4c03-871a-48ba-8d2c-d8060f61fea9.jpg</url>
      <title>DEV Community: Aneesah</title>
      <link>https://dev.to/https_aneesah</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/https_aneesah"/>
    <language>en</language>
    <item>
      <title>Next Stop: AWS Cloud "Cloud Security with IAM: Implementing Role-Based Access "</title>
      <dc:creator>Aneesah</dc:creator>
      <pubDate>Fri, 16 May 2025 01:51:59 +0000</pubDate>
      <link>https://dev.to/https_aneesah/next-stop-aws-cloud-cloud-security-with-iam-implementing-role-based-access--618</link>
      <guid>https://dev.to/https_aneesah/next-stop-aws-cloud-cloud-security-with-iam-implementing-role-based-access--618</guid>
      <description>&lt;p&gt;As someone who is gaining experience working within AWS, I wanted to take a hands-on approach to designing access controls using IAM (Identity and Access Management). The goal was simple: implement user roles that align with &lt;strong&gt;security best practices&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;To do that, I started by asking three key questions:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Who needs access?&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;What can they do (or not do)?&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;What security protocols are in place to control that access?&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;With those questions guiding me, I created a basic structure and visual diagram to outline two IAM groups:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A &lt;strong&gt;Production Team&lt;/strong&gt;, and&lt;/li&gt;
&lt;li&gt;An &lt;strong&gt;Intern Team&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The &lt;strong&gt;Production Team&lt;/strong&gt; was granted full access to manage EC2 instances, while the &lt;strong&gt;Intern Team&lt;/strong&gt; received read-only access — enough to observe and learn, but not change anything.&lt;/p&gt;




&lt;h3&gt;
  
  
  Breaking Down the Diagram
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Foinlwi23w14qhc0ip2f4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Foinlwi23w14qhc0ip2f4.png" alt="RBAC permissions in AWS" width="800" height="400"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  Production Team
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Access level:&lt;/strong&gt; Full access to EC2&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Permissions:&lt;/strong&gt; Start/stop EC2 instances, view logs&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Security:&lt;/strong&gt; Multi-Factor Authentication (MFA) enforced&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;IAM Policy:&lt;/strong&gt; Grants full EC2 access&lt;/li&gt;
&lt;li&gt; Used by team members managing active cloud infrastructure&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  Intern Team
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Access level:&lt;/strong&gt; Read-only&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Permissions:&lt;/strong&gt; Can view EC2 services, but &lt;strong&gt;cannot&lt;/strong&gt; start/stop/modify&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Security:&lt;/strong&gt; MFA required&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;IAM Policy:&lt;/strong&gt; &lt;code&gt;AmazonEC2ReadOnlyAccess&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt; Ideal for observing and learning cloud operations without risk&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  Layered Security
&lt;/h3&gt;

&lt;p&gt;Good IAM design doesn’t stop at access policies. Here’s how I added extra layers of protection:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;MFA Enforcement&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Required for every user to add a second factor of authentication.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Security Monitoring&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;AWS GuardDuty&lt;/strong&gt;: Detects suspicious activity&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;AWS Detective&lt;/strong&gt;: Helps investigate account behavior&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Security Hub&lt;/strong&gt;: Centralizes compliance findings&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  Why This Setup Works
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Simple&lt;/strong&gt; — Two clearly defined groups make it easy to manage.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Secure&lt;/strong&gt; — MFA + least privilege = strong foundational security.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Scalable&lt;/strong&gt; — Easy to expand and onboard new users or teams.&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  Final Thoughts
&lt;/h3&gt;

&lt;p&gt;This small project helped me build confidence in using IAM securely and practically. By setting up clear roles, applying the principle of least privilege, and using layered security, I learned how AWS IAM can support both &lt;strong&gt;productivity and protection&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;If you’re just starting out, this is a great way to practice real-world cloud security. Start small, keep it clear, and always think about &lt;strong&gt;who needs what access — and how to protect it.&lt;/strong&gt;&lt;/p&gt;




&lt;p&gt;A video demo is coming soon.&lt;/p&gt;

</description>
      <category>iam</category>
      <category>aws</category>
      <category>security</category>
    </item>
    <item>
      <title>Next Stop: AWS Cloud - "Automating Receipt Emails with AI"</title>
      <dc:creator>Aneesah</dc:creator>
      <pubDate>Wed, 23 Apr 2025 22:28:04 +0000</pubDate>
      <link>https://dev.to/https_aneesah/next-stop-aws-cloud-automated-receipt-processing-tool-3d17</link>
      <guid>https://dev.to/https_aneesah/next-stop-aws-cloud-automated-receipt-processing-tool-3d17</guid>
      <description>&lt;p&gt;When I decided to start learning AWS, I knew I didn’t want to just read documentation—I wanted to build something. I found a great starter project from Tech with Lucy on YouTube:&lt;br&gt;
&lt;a href="https://youtu.be/CewrCUmwm90?si=dWOphOwMt4-6QGoY" rel="noopener noreferrer"&gt;Build With Me: Automating My Life with AWS &amp;amp; AI&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This tutorial walked me through building a simple workflow that automatically processes receipt files, extracts the important data, stores it, and sends me an email summary. It was surprisingly beginner-friendly and helped me get comfortable with multiple AWS services.&lt;/p&gt;
&lt;h2&gt;
  
  
  What This Project Does
&lt;/h2&gt;

&lt;p&gt;Here’s the general idea: I upload a receipt to the cloud, and AWS takes care of the rest.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The file goes into S3 (AWS’s cloud storage).&lt;/li&gt;
&lt;li&gt;Textract reads the file and pulls out data like the total amount.&lt;/li&gt;
&lt;li&gt;DynamoDB stores that data in a structured format.&lt;/li&gt;
&lt;li&gt;SES (Simple Email Service) sends me an email with a receipt summary.&lt;/li&gt;
&lt;li&gt;Lambda glues everything together and automates the flow.&lt;/li&gt;
&lt;li&gt;CloudWatch helps monitor logs in case anything goes wrong.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This small project covers a lot of what AWS can do—and it only took me about an hour to set up.&lt;/p&gt;
&lt;h3&gt;
  
  
  AWS Services I Learned About
&lt;/h3&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Service&lt;/th&gt;
&lt;th&gt;Purpose&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;S3&lt;/td&gt;
&lt;td&gt;Stores receipt files&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Textract&lt;/td&gt;
&lt;td&gt;Extracts text/data from files&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;DynamoDB&lt;/td&gt;
&lt;td&gt;Saves extracted data&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;SES&lt;/td&gt;
&lt;td&gt;Sends email with data summary&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Lambda&lt;/td&gt;
&lt;td&gt;Runs automation code (serverless)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;CloudWatch&lt;/td&gt;
&lt;td&gt;Tracks logs for troubleshooting&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;IAM Roles&lt;/td&gt;
&lt;td&gt;Controls access and permissions&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;
&lt;h2&gt;
  
  
  The Error That Made Me Sweat
&lt;/h2&gt;

&lt;p&gt;Everything was working great until I hit an error when testing the Lambda function:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Log group does not exist
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Classic first-time AWS moment.&lt;/p&gt;

&lt;p&gt;To troubleshoot, I followed this AWS support article:&lt;a href="https://repost.aws/knowledge-center/lambda-cloudwatch-log-streams-error" rel="noopener noreferrer"&gt;How do I resolve the "Log group does not exist" error for Lambda function logs in the CloudWatch console?&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Here’s what happened:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;I checked the IAM role attached to the Lambda function.&lt;/li&gt;
&lt;li&gt;The policy &lt;code&gt;AWSLambdaBasicExecutionRole&lt;/code&gt; was attached, but it was missing proper permissions.&lt;/li&gt;
&lt;li&gt;Specifically, it didn’t allow &lt;code&gt;CreateLogGroup&lt;/code&gt; and &lt;code&gt;CreateLogStream&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;On top of that, the &lt;strong&gt;&lt;em&gt;resource name for the log group&lt;/em&gt;&lt;/strong&gt; didn’t match my Lambda function.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Once I corrected the policy and specified the right resource name, everything fell into place. Logs were being generated, the function executed, and emails started landing in my inbox&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjoch6n50os791m9hig9y.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjoch6n50os791m9hig9y.png" alt="Plain text email showing successful message of receipts. Three receipts sent to inbox from Amazon SES" width="800" height="107"&gt;&lt;/a&gt; &lt;/p&gt;

&lt;h2&gt;
  
  
  What I Learned
&lt;/h2&gt;

&lt;p&gt;This project taught me that AWS isn’t just about spinning up servers—it’s about building tools that can automate parts of your life or work.&lt;/p&gt;

&lt;p&gt;Here’s what stood out:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;AWS Textract is powerful: It can read and pull data from receipts with no manual effort.&lt;/li&gt;
&lt;li&gt;IAM Roles matter: Even if a policy is attached, it must be properly configured.&lt;/li&gt;
&lt;li&gt;CloudWatch is a great assist when debugging.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Why You Should Try This
&lt;/h2&gt;

&lt;p&gt;If you're new to cloud computing and AWS, this project gives you:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A real-world use case&lt;/li&gt;
&lt;li&gt;Exposure to 5+ core AWS services&lt;/li&gt;
&lt;li&gt;The chance to solve an actual error (and learn from it)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It's short, hands-on, and very rewarding.&lt;/p&gt;

&lt;p&gt;Give it a go, and let me know how it works out for you!&lt;/p&gt;

</description>
      <category>aws</category>
      <category>cloudcomputing</category>
      <category>sideprojects</category>
    </item>
    <item>
      <title>30 Day SOC Challenge -Day 7</title>
      <dc:creator>Aneesah</dc:creator>
      <pubDate>Thu, 17 Apr 2025 06:01:39 +0000</pubDate>
      <link>https://dev.to/https_aneesah/day-7-3743</link>
      <guid>https://dev.to/https_aneesah/day-7-3743</guid>
      <description>&lt;p&gt;Goal: &lt;br&gt;
Install Elastic Agent on Windows Server ,Enroll the Windows Server into a fleet&lt;/p&gt;

&lt;p&gt;Troubleshooting Fleet Server as it's not connecting to Elastic&lt;br&gt;
Path of a file doesn't exist &lt;/p&gt;

&lt;p&gt;Beginning of the end, I struggled a lot on Day 7 so much my own OS was taking a beating.&lt;/p&gt;

</description>
      <category>tutorial</category>
      <category>security</category>
      <category>devops</category>
      <category>windows</category>
    </item>
    <item>
      <title>30Day- SOC challenge Day 4 &amp; 5</title>
      <dc:creator>Aneesah</dc:creator>
      <pubDate>Thu, 17 Apr 2025 05:57:51 +0000</pubDate>
      <link>https://dev.to/https_aneesah/30day-soc-challenge-day-4-5-2mk9</link>
      <guid>https://dev.to/https_aneesah/30day-soc-challenge-day-4-5-2mk9</guid>
      <description>&lt;p&gt;DAY 4 : Setting up Kibana.&lt;br&gt;
Added tokens to access elastic from IP Address.&lt;br&gt;
 Had to troubleshoot a page not loading on port 5601&lt;/p&gt;

&lt;p&gt;&lt;code&gt;config elastic .yml&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Lastly, tighten up firewall, 1-6355 for TCP&lt;/p&gt;

&lt;p&gt;Got verified tokens and the site load with less fiction this time.&lt;/p&gt;

&lt;p&gt;Went back to Kibana to configure encryption keys.&lt;/p&gt;

&lt;p&gt;Ran 3 Xpack keys&lt;/p&gt;

&lt;p&gt;Day 4 was fun exposed to just setting up &amp;amp; configuration and reviewing docs &lt;/p&gt;

&lt;p&gt;Spent a lot of time in the terminal and picked up a few things along the way.&lt;/p&gt;

&lt;p&gt;DAY 5: setting up windows server&lt;/p&gt;

&lt;p&gt;Deployed a new server Windows and not adding this to the VPC and will expose this server to everyone&lt;/p&gt;

&lt;p&gt;The Windows server was easy to setup.&lt;/p&gt;

</description>
      <category>kibana</category>
      <category>socanalyst</category>
      <category>vultr</category>
    </item>
    <item>
      <title>Cash App Social Engineering Scam: A Beginner’s Guide</title>
      <dc:creator>Aneesah</dc:creator>
      <pubDate>Fri, 20 Sep 2024 06:20:50 +0000</pubDate>
      <link>https://dev.to/https_aneesah/cash-app-social-engineering-scam-a-beginners-guide-11nf</link>
      <guid>https://dev.to/https_aneesah/cash-app-social-engineering-scam-a-beginners-guide-11nf</guid>
      <description>&lt;h2&gt;
  
  
  Introduction
&lt;/h2&gt;

&lt;p&gt;Cash App is a convenient way to send, spend, and save money. However, with this ease comes risks, especially from scams that exploit personal information. One such scam involves identity theft and the misuse of Cash App debit cards. In this blog, we’ll walk through how this scam works and how to protect yourself, even if you’re new to cybersecurity.&lt;/p&gt;

&lt;h3&gt;
  
  
  What is the Scam
&lt;/h3&gt;

&lt;p&gt;The scam begins with a Cash App debit card being opened in your name—without your knowledge—thanks to identity theft and social engineering techniques. Once the card is activated, the scammer gains access to the linked banking details and can control the account. The money loaded onto the card is either transferred to another account or you are locked out of the account entirely.&lt;/p&gt;

&lt;h4&gt;
  
  
  Key Points of the Scam:
&lt;/h4&gt;

&lt;ol&gt;
&lt;li&gt;A debit card is issued in your name.&lt;/li&gt;
&lt;li&gt;Scammers are alerted to active cards; gaining access to the fake Cash App account.&lt;/li&gt;
&lt;li&gt;Money from the account is transferred or your access is restricted.&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  How Social Engineering Powers This Scam
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;What is Social Engineering?&lt;/strong&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;At its core, social engineering is not a cyber attack, but a psychological one. Scammers exploit your trust and willingness to act without suspicion. By manipulating your response to a surprise—like receiving an unexpected debit card—they persuade you into compromising actions. It’s like a modern con game, where the aim is to make you let your guard down.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;In this case, the scam preys on the doubt you might feel about whether or not you requested the debit card. Scammers rely on confusion and hesitation to increase their success rate.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4oueajmaxciln4248j77.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4oueajmaxciln4248j77.jpg" alt="Black and white icons verifying CashApp card" width="800" height="800"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  How the Scam Works, Step-by-Step
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;Receiving the Debit Card: You receive a Cash App debit card in the mail, which you didn’t request.&lt;/li&gt;
&lt;li&gt;Activating the Card: Scammers are alerted to an active card, you unknowingly sync your banking details to fake Cash App Account. &lt;/li&gt;
&lt;li&gt;Locking You Out: Once the card is linked, scammers may either transfer the money from your account or lock you out of the Cash App account entirely. &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frrr2kxgiaq25pmj0vrnc.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frrr2kxgiaq25pmj0vrnc.jpg" alt="black debit card from CahsApp" width="800" height="800"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  How to Protect Yourself
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Report the Scam Immediately&lt;br&gt;
If you’re an existing Cash App user and you receive an unfamiliar debit card, contact Cash App support. Report any suspicious accounts created in your name to prevent further fraud.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Enable Two-Factor Authentication (2FA)&lt;br&gt;
Go to your Cash App profile settings and enable two-factor authentication to add an extra layer of security. This may help prevent unauthorized access to your account.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Verify Your Identity&lt;br&gt;
Verify your account identity in Cash App settings to add more protection. This may help stop scammers from creating new accounts using your identity.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Freeze Your Credit&lt;br&gt;
To further protect yourself, consider freezing your credit with major credit bureaus (Experian, Equifax, TransUnion). This prevents scammers from opening new accounts in your name. Also, file a report with the Federal Trade Commission (FTC) at identitytheft.gov.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5xd7cn5c30dens2ad7uy.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5xd7cn5c30dens2ad7uy.jpg" alt="Account screenshot reporting Cash App account" width="800" height="800"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Useful Resources:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://consumer.ftc.gov/features/identity-theft" rel="noopener noreferrer"&gt;FTC Identity Theft Reporting&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;If you receive a random Cash App debit card in the mail, don’t ignore it. Scammers rely on your confusion and hesitation to pull off this social engineering attack. By reporting the card, securing your accounts, and freezing your credit, you can stop these fraudsters in their tracks.&lt;/p&gt;

&lt;p&gt;Always remember that social engineering scams like this rely on psychological manipulation. Stay vigilant, and don’t let uncertainty lead you to take unsafe actions.&lt;/p&gt;

</description>
      <category>socialengineering</category>
      <category>securityawareness</category>
      <category>fintech</category>
      <category>scam</category>
    </item>
    <item>
      <title>30 Day SOC Challenge- Day 2 &amp; 3 : ELK Stack / Elastic Search</title>
      <dc:creator>Aneesah</dc:creator>
      <pubDate>Mon, 09 Sep 2024 01:20:27 +0000</pubDate>
      <link>https://dev.to/https_aneesah/30-day-soc-challenge-day-2-3-elk-stack-elastic-search-coe</link>
      <guid>https://dev.to/https_aneesah/30-day-soc-challenge-day-2-3-elk-stack-elastic-search-coe</guid>
      <description>&lt;h2&gt;
  
  
  DAY 2
&lt;/h2&gt;

&lt;p&gt;For day 2 I was introduced to the ELK Stack.&lt;br&gt;
I'll be using this stack for the duration of the challenge, but before I dive in lets get a better understanding of the ELK Stack&lt;/p&gt;
&lt;h3&gt;
  
  
  What is ELK Stack
&lt;/h3&gt;

&lt;p&gt;E - Elastic search: &lt;em&gt;database to store logs, uses and ES|QL, uses RESTFUL API &amp;amp; JSON to query data&lt;/em&gt;&lt;br&gt;
L - Logstash: &lt;em&gt;pipeline to collect telemetry from various sources to transforms it and sends it to your stash&lt;/em&gt; &lt;br&gt;
K - Kibana: &lt;em&gt;Web console to query our logs stored within our elastic search instance. Data visualization &amp;amp; Data Explorations &amp;amp; GEO Mapping&lt;/em&gt;&lt;/p&gt;
&lt;h3&gt;
  
  
  Benefits to ELK
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;Centralized Logging 
&lt;em&gt;meets compliance requirements &amp;amp; search data&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;Flexibility
&lt;em&gt;Customized Ingestion&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;Visualizations
&lt;em&gt;Observe information at a glance&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;Scalability
&lt;em&gt;Easy to configure to handle larger environments&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;Ecosystem
&lt;em&gt;Many integrations and rich community&lt;/em&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Search Data, Create Visualization, Create Reports, Create Alerts are the focus of the ELK Stack.&lt;/p&gt;

&lt;p&gt;After getting a rundown of what the ELK stack is I noticed I'm already familiar with 2 out the 3; those being &lt;em&gt;Elastic search and Kibana&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;Both of these tools I had access to working in my previous Incident management role, often querying logs for event instance and to paras through the data. &lt;br&gt;
This will be the first time setting up Elastic search &amp;amp; Kibana on my own.&lt;/p&gt;
&lt;h2&gt;
  
  
  Day 3
&lt;/h2&gt;

&lt;p&gt;Following we got into the terminal and downloaded Elastic Search and configured the firewall &lt;/p&gt;
&lt;h3&gt;
  
  
  Creating a Virtual Private Cloud
&lt;/h3&gt;

&lt;p&gt;First I created a VPC 2.0 using Vultr, after I spun up a sever opted for an Ubuntu image to be hosted within the network group.&lt;/p&gt;

&lt;p&gt;Setting up the server was very easy, similar to spinning up servers in AWS or Azure.&lt;/p&gt;

&lt;p&gt;Refer back to &lt;a href="https://dev.to/https_aneesah/30-day-soc-challenge-day-1-logical-diagram-1461"&gt;DAY 1: Logical Diagram &lt;/a&gt;to see my intended setup&lt;/p&gt;
&lt;h3&gt;
  
  
  Installing Elastic Search
&lt;/h3&gt;

&lt;p&gt;From Elastic.co I went to download section, copy the link for zip file.&lt;br&gt;
The fun comes in when I ssh into the VM from the terminal to plug in the url of the download.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Root@ plubic IP Address
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Once in the VM I ran cmd&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;wget - url link from Elastic search download
dpkg -i 'Elasticsearch package file name &amp;amp; version'
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyj11ig0qce64syz8165v.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyj11ig0qce64syz8165v.png" alt="Terminal screenshot- black background white text" width="800" height="37"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After installing Elastic search I noted the security configuration info.&lt;/p&gt;

&lt;p&gt;This contained my super user password and steps on how to generate Kibana token, Elastic nodes, and update user password.&lt;/p&gt;

&lt;p&gt;I copied all of this to a note pad for future reference.&lt;/p&gt;

&lt;h3&gt;
  
  
  Configure Elastic Search
&lt;/h3&gt;

&lt;p&gt;Before I can get started using Elastic search I wanted to configure a few settings. &lt;br&gt;
So I accessed the Elastic.yml file.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;nano elasticsearch.yml
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;I updated the &lt;em&gt;Network host&lt;/em&gt; and removed the comment on &lt;em&gt;http port&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;The network host will point to the private IP I created in the VPC, this will allow my SOC computer to access my elastic search instance.&lt;/p&gt;

&lt;h4&gt;
  
  
  Firewall group
&lt;/h4&gt;

&lt;p&gt;Lastly I configured my firewall to make sure it's tightened up. &lt;br&gt;
I went back to Vultr, under network selected firewall. &lt;br&gt;
I created a group for my server and by default the ssh source was set to &lt;em&gt;Anywhere&lt;/em&gt; &lt;/p&gt;

&lt;p&gt;I updated this to be from MyIP. &lt;/p&gt;

&lt;p&gt;Now my VM has a Firewall group that is only accessible via myIP address.&lt;/p&gt;
&lt;h3&gt;
  
  
  Run Elastic search
&lt;/h3&gt;

&lt;p&gt;Now let's run the Elastic search !&lt;br&gt;
I head back to my terminal and ran the following cmds&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;sudo systemctl daemon-reload 
sudo systemctl enable elasticsearch.service
sudo systemctl start elasticsearch.service
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;I wanted to checked that I successfully got it up and running.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;sudo systemctl status elasticsearch.service
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fejayf5bubgmzy7iutvk2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fejayf5bubgmzy7iutvk2.png" alt="Terminal command - black background white text" width="800" height="128"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Take Aways
&lt;/h2&gt;

&lt;p&gt;Day 2 &amp;amp; 3 were very informative on the ELK Stack and I enjoy playing around in the terminal. I often forget a few cmd so I keep a cheatsheet on hand. &lt;/p&gt;

&lt;p&gt;Early in my tech career I would be frighten/ unsure about the terminal and even scared to run cmds; but now I enjoy being in there and getting messy.&lt;/p&gt;

</description>
      <category>elasticsearch</category>
      <category>kibana</category>
      <category>socanalyst</category>
    </item>
    <item>
      <title>30 Day SOC Challenge - Day 1 : Logical Diagram</title>
      <dc:creator>Aneesah</dc:creator>
      <pubDate>Thu, 05 Sep 2024 06:24:15 +0000</pubDate>
      <link>https://dev.to/https_aneesah/30-day-soc-challenge-day-1-logical-diagram-1461</link>
      <guid>https://dev.to/https_aneesah/30-day-soc-challenge-day-1-logical-diagram-1461</guid>
      <description>&lt;p&gt;I'm on a journey to refine a few of my  Incident Response / Cyber Security skills. &lt;br&gt;
So for the month of September I'll be working on some SOC Analyst projects courtesy of &lt;a href="https://youtube.com/@mydfir?si=xymB_3_8CIMaq1Cb" rel="noopener noreferrer"&gt;MyDIF SOC Analyst Challenge &lt;/a&gt;on Youtube. &lt;/p&gt;

&lt;p&gt;The 30 day challenge will range day to day but most importantly help me build consistency/accountability.&lt;/p&gt;

&lt;p&gt;DAY 1. Starting off with building a Logical Diagram.&lt;/p&gt;

&lt;p&gt;I haven't worked with Draw.io in what feels like ages. I'm familiar with using this diagram builder when working as Project Manager for support on a Restaurant application.&lt;/p&gt;

&lt;p&gt;So getting started I built a Logical Diagram of the setup I'll be focusing on during these 30days.&lt;/p&gt;

&lt;p&gt;The cloud infrastructure I'll be working with is Vultr, from there I'll create 6 servers with functions. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0rww3pnn1pjnd2gegiu2.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0rww3pnn1pjnd2gegiu2.jpg" alt="Image description" width="736" height="762"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This diagram will be updated and changed throughout, however here is a rough outline of the  project.&lt;/p&gt;

</description>
      <category>socanalyst</category>
      <category>challenge</category>
      <category>cybersecurity</category>
      <category>vultr</category>
    </item>
    <item>
      <title>Cash App Social Engineering Scam: A Beginner’s Guide</title>
      <dc:creator>Aneesah</dc:creator>
      <pubDate>Fri, 23 Aug 2024 04:52:56 +0000</pubDate>
      <link>https://dev.to/https_aneesah/debit-card-scam-courtesy-of-cashapp-1169</link>
      <guid>https://dev.to/https_aneesah/debit-card-scam-courtesy-of-cashapp-1169</guid>
      <description>&lt;h2&gt;
  
  
  Introduction
&lt;/h2&gt;

&lt;p&gt;Cash App is a convenient way to send, spend, and save money. However, with this ease comes risks, especially from scams that exploit personal information. One such scam involves identity theft and the misuse of Cash App debit cards. In this blog, we’ll walk through how this scam works and how to protect yourself, even if you’re new to cybersecurity.&lt;/p&gt;

&lt;h3&gt;
  
  
  What is the Scam
&lt;/h3&gt;

&lt;p&gt;The scam begins with a Cash App debit card being opened in your name—without your knowledge—thanks to identity theft and social engineering techniques. Once the card is activated, the scammer gains access to the linked banking details and can control the account. The money loaded onto the card is either transferred to another account or you are locked out of the account entirely.&lt;/p&gt;

&lt;h4&gt;
  
  
  Key Points of the Scam:
&lt;/h4&gt;

&lt;ol&gt;
&lt;li&gt;A debit card is issued in your name.&lt;/li&gt;
&lt;li&gt;Scammers are alerted to active cards; gaining access to the fake Cash App account.&lt;/li&gt;
&lt;li&gt;Money from the account is transferred or your access is restricted.&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  How Social Engineering Powers This Scam
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;What is Social Engineering?&lt;/strong&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;At its core, social engineering is not a cyber attack, but a psychological one. Scammers exploit your trust and willingness to act without suspicion. By manipulating your response to a surprise—like receiving an unexpected debit card—they persuade you into compromising actions. It’s like a modern con game, where the aim is to make you let your guard down.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;In this case, the scam preys on the doubt you might feel about whether or not you requested the debit card. Scammers rely on confusion and hesitation to increase their success rate.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4oueajmaxciln4248j77.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4oueajmaxciln4248j77.jpg" alt="Black and white icons verifying CashApp card" width="800" height="800"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  How the Scam Works, Step-by-Step
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;Receiving the Debit Card: You receive a Cash App debit card in the mail, which you didn’t request.&lt;/li&gt;
&lt;li&gt;Activating the Card: Scammers are alerted to an active card, you unknowingly sync your banking details to fake Cash App Account. &lt;/li&gt;
&lt;li&gt;Locking You Out: Once the card is linked, scammers may either transfer the money from your account or lock you out of the Cash App account entirely. &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frrr2kxgiaq25pmj0vrnc.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frrr2kxgiaq25pmj0vrnc.jpg" alt="black debit card from CahsApp" width="800" height="800"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  How to Protect Yourself
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Report the Scam Immediately&lt;br&gt;
If you’re an existing Cash App user and you receive an unfamiliar debit card, contact Cash App support. Report any suspicious accounts created in your name to prevent further fraud.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Enable Two-Factor Authentication (2FA)&lt;br&gt;
Go to your Cash App profile settings and enable two-factor authentication to add an extra layer of security. This may help prevent unauthorized access to your account.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Verify Your Identity&lt;br&gt;
Verify your account identity in Cash App settings to add more protection. This may help stop scammers from creating new accounts using your identity.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Freeze Your Credit&lt;br&gt;
To further protect yourself, consider freezing your credit with major credit bureaus (Experian, Equifax, TransUnion). This prevents scammers from opening new accounts in your name. Also, file a report with the Federal Trade Commission (FTC) at identitytheft.gov.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5xd7cn5c30dens2ad7uy.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5xd7cn5c30dens2ad7uy.jpg" alt="Account screenshot reporting Cash App account" width="800" height="800"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Useful Resources:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://consumer.ftc.gov/features/identity-theft" rel="noopener noreferrer"&gt;FTC Identity Theft Reporting&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;If you receive a random Cash App debit card in the mail, don’t ignore it. Scammers rely on your confusion and hesitation to pull off this social engineering attack. By reporting the card, securing your accounts, and freezing your credit, you can stop these fraudsters in their tracks.&lt;/p&gt;

&lt;p&gt;Always remember that social engineering scams like this rely on psychological manipulation. Stay vigilant, and don’t let uncertainty lead you to take unsafe actions.&lt;/p&gt;

</description>
      <category>socialengineering</category>
      <category>scams</category>
      <category>securityawareness</category>
      <category>fintech</category>
    </item>
  </channel>
</rss>
