<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: JOHNMARY-BORNICA-PRINCE19</title>
    <description>The latest articles on DEV Community by JOHNMARY-BORNICA-PRINCE19 (@johnmarybornicaprince19).</description>
    <link>https://dev.to/johnmarybornicaprince19</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1278899%2Fb45bde5a-b815-4f96-b595-b79973fdf420.png</url>
      <title>DEV Community: JOHNMARY-BORNICA-PRINCE19</title>
      <link>https://dev.to/johnmarybornicaprince19</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/johnmarybornicaprince19"/>
    <language>en</language>
    <item>
      <title>Objective-based penetration testing</title>
      <dc:creator>JOHNMARY-BORNICA-PRINCE19</dc:creator>
      <pubDate>Wed, 06 Mar 2024 14:10:49 +0000</pubDate>
      <link>https://dev.to/johnmarybornicaprince19/objective-based-penetration-testing-2jdj</link>
      <guid>https://dev.to/johnmarybornicaprince19/objective-based-penetration-testing-2jdj</guid>
      <description>&lt;p&gt;The main objective of a pentest  is to identify the actual risk, distinguishing it from the risk rating provided by the scanner and providing a firm with a risk value for each asset as well as the risk to the organization's reputation. It matters more how exposed people are and how simple it is to take advantage of that exposure than it does how much risk they actually have.&lt;/p&gt;

&lt;p&gt;An identified danger does not actually represent a risk and does not require proof; one such threat is Cross-Site Scripting (XSS), a script injection vulnerability that allows for the theft of user credentials. It might not have a big effect on the business if a client who runs a trading company's brochure website—which offers static information to its clients—was susceptible to cross-site scripting attacks (XSS). In this scenario, a client may choose to take the risk and implement a Web Application Firewall (WAF)-based mitigation strategy in order to stop XSS assaults.&lt;/p&gt;

&lt;p&gt;However, if the same weakness was found on their primary trading website, it would be a serious problem that needed to be fixed right away because the business would run the danger of customers losing faith in it if hackers were able to obtain their login credentials. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Objective-based penetration testing&lt;/strong&gt; is time-based, depending on the specific problem that an organization faces. An example of an objective is: &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;We are most worried about our data being stolen and the regulatory fines incurred as a consequence of these breaches&lt;br&gt;
.&lt;br&gt;
 So, the objective now is to compromise the data either by exploiting a system flaw or by manipulating the employees through phishing; sometimes it will be a surprise to see some of their data is already available on the dark web. Every objective comes with its own Tactics, Techniques, and Procedures (TTP) that will support the primary goal of the penetration test activity.&lt;/p&gt;
&lt;/blockquote&gt;

</description>
    </item>
    <item>
      <title>Goal-Based Penetration Testing</title>
      <dc:creator>JOHNMARY-BORNICA-PRINCE19</dc:creator>
      <pubDate>Wed, 06 Mar 2024 14:02:23 +0000</pubDate>
      <link>https://dev.to/johnmarybornicaprince19/goal-based-penetration-testing-2nk3</link>
      <guid>https://dev.to/johnmarybornicaprince19/goal-based-penetration-testing-2nk3</guid>
      <description>&lt;p&gt;The COVID-19 pandemic has altered global dynamics. All employees at companies of all sizes now work remotely, having transitioned from having none or only some of them do so. The new normal has made distant and accessible technology crucial for both personal and professional life. We may categorically refer to this as a virtual world since private conversations that once took place in closed rooms now take place online. As a result, there are now at least five times as many cyberthreats. Threat actors take advantage of this digital revolution to leverage user and company errors as a point of entry for monetary gain, reputational harm, or other objectives. This occurs in the form of ransomware, phishing, and data breaches. &lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>career</category>
      <category>security</category>
      <category>linux</category>
    </item>
    <item>
      <title>DC3DD: The Forensic Disk Imaging Tool by Department of Defense Cyber Crime Center as one of the Greatest Forensics Tools</title>
      <dc:creator>JOHNMARY-BORNICA-PRINCE19</dc:creator>
      <pubDate>Tue, 20 Feb 2024 11:19:45 +0000</pubDate>
      <link>https://dev.to/johnmarybornicaprince19/dc3dd-the-forensic-disk-imaging-tool-by-department-of-defense-cyber-crime-center-as-one-of-the-greatest-forensics-tools-3o7m</link>
      <guid>https://dev.to/johnmarybornicaprince19/dc3dd-the-forensic-disk-imaging-tool-by-department-of-defense-cyber-crime-center-as-one-of-the-greatest-forensics-tools-3o7m</guid>
      <description>&lt;p&gt;&lt;strong&gt;Introduction:&lt;/strong&gt;&lt;br&gt;
In the realm of digital forensics, the reliability and integrity of evidence are paramount. As cybercrimes continue to evolve in sophistication, so too must the tools used to investigate them. One such tool, the Department of Defense Cyber Crime Center Data Dumper (DC3DD), stands out as a crucial asset in the arsenal of forensic investigators. In this article, we'll delve into what DC3DD is, its features, and why it is a vital component in forensic investigations.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What is DC3DD?&lt;/strong&gt;&lt;br&gt;
DC3DD, an acronym for Department of Defense Cyber Crime Center Data Dumper, is a specialized tool developed by the Department of Defense Cyber Crime Center (DC3) for creating forensic disk images. It serves as an enhanced version of the traditional dd (data duplicator) tool, tailored specifically for forensic use.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Features and Capabilities:&lt;/strong&gt;&lt;br&gt;
DC3DD offers several features that make it invaluable for forensic investigations:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Hash Calculation:&lt;/strong&gt; DC3DD can calculate cryptographic hash values (such as MD5, SHA-1, SHA-256) for the acquired disk image during the imaging process. This ensures data integrity and enables investigators to verify that the image hasn't been altered.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Error Handling:&lt;/strong&gt; The tool incorporates robust error handling mechanisms to handle read errors gracefully. In cases where a sector cannot be read due to hardware issues or other factors, DC3DD can continue imaging while logging the encountered errors.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Logging:&lt;/strong&gt; DC3DD provides comprehensive logging capabilities, recording important metadata such as imaging parameters, error messages, and hash values. This logging feature is crucial for documenting the imaging process and maintaining a proper chain of custody, essential in legal proceedings.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Flexibility:&lt;/strong&gt; DC3DD offers a range of options and parameters to customize the imaging process according to specific investigative needs. Investigators can configure parameters such as block size, output format, and hashing algorithms to suit the requirements of each case.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why DC3DD Matters:&lt;/strong&gt;&lt;br&gt;
DC3DD plays a vital role in digital forensic investigations for several reasons:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Data Integrity:&lt;/strong&gt; By calculating hash values and implementing error handling mechanisms, DC3DD ensures the integrity of acquired disk images. This is crucial for preserving the evidentiary value of digital evidence and maintaining its admissibility in court.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Standardization:&lt;/strong&gt; As a tool developed by the Department of Defense Cyber Crime Center, DC3DD adheres to rigorous standards and best practices in digital forensics. Its use promotes consistency and reliability across forensic investigations conducted by various agencies and organizations.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Efficiency:&lt;/strong&gt; The features offered by DC3DD streamline the imaging process, allowing investigators to acquire disk images efficiently and effectively. This is particularly important in time-sensitive investigations where rapid response is critical.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Conclusion:&lt;/strong&gt;&lt;br&gt;
In the ever-evolving landscape of cybercrime, forensic investigators require advanced tools to uncover digital evidence and support legal proceedings. DC3DD stands out as a sophisticated solution developed by the Department of Defense Cyber Crime Center, offering robust features tailored for forensic disk imaging. Its ability to ensure data integrity, provide flexibility, and adhere to forensic standards makes it an indispensable tool in the arsenal of digital investigators worldwide.&lt;/p&gt;

</description>
      <category>computerscience</category>
      <category>ubuntu</category>
      <category>cybersecurity</category>
      <category>learning</category>
    </item>
    <item>
      <title>Introduction to Digital Forensics</title>
      <dc:creator>JOHNMARY-BORNICA-PRINCE19</dc:creator>
      <pubDate>Tue, 20 Feb 2024 09:50:50 +0000</pubDate>
      <link>https://dev.to/johnmarybornicaprince19/introduction-to-digital-forensics-4i22</link>
      <guid>https://dev.to/johnmarybornicaprince19/introduction-to-digital-forensics-4i22</guid>
      <description>&lt;p&gt;The first thing I'd like to cover under cyber security is an understanding of digital forensics and its proper practices and procedures. At some point, you may have come across several books, blogs, and even videos demonstrating various aspects of digital forensics and the different tools used. It is of great importance to understand that forensics itself is a science, involving very well-documented best practices and methods in an effort to reveal whether something exists. &lt;/p&gt;

&lt;p&gt;Digital forensics involves the preservation, acquisition, documentation, analysis, and interpretation of evidence identified from various storage media types. It is not only limited to laptops, desktops, tablets, and mobile devices, but also extends to data in  transit that is transmitted across public or private networks. In some cases, digital forensics involves the discovery and/or recovery of data using various methods and tools available to the investigator. Digital forensics investigations include, but are not limited to, the following: &lt;br&gt;
&lt;strong&gt;• Data recovery&lt;/strong&gt;: Investigating and recovering data that may have been deleted, changed to different file extensions, and even hidden. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;• Identity theft:&lt;/strong&gt; Many fraudulent activities, ranging from stolen credit card usage  to fake social media profiles, usually involving some sort of identity theft. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;• Malware and ransomware investigations:&lt;/strong&gt; To date, ransomware spread by Trojans and worms across networks and the internet are some of the biggest threats to companies, military organizations, and individuals. Malware can also be spread  to, and by, mobile devices and smart devices.&lt;br&gt;
&lt;strong&gt;• Network and internet investigations:&lt;/strong&gt; Investigating Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) attacks, and tracking down accessed devices, including printers and files.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;• Email investigations:&lt;/strong&gt; Investigating the email header, message IDs, source and Internet Protocol (IP) origins; attached content and geo location information can all be investigated, especially if there is a business email compromise (BEC). &lt;/p&gt;

&lt;p&gt;• &lt;strong&gt;Corporate espionage:&lt;/strong&gt; Many companies are moving away from print copies and toward cloud and traditional disk media. As such, a digital footprint is always left behind; should sensitive information be accessed or transmitted?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;• Child pornography investigations:&lt;/strong&gt; Sadly, the reality is that children are widely exploited on the internet and within the deep web. With the use of technology and highly-skilled forensic analysts, investigations can be carried out to bring down exploitation rings by analyzing internet traffic, browser history, payment transactions, email records, and images.&lt;/p&gt;

</description>
      <category>learning</category>
      <category>security</category>
      <category>linux</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>INTRODUCTION TO CYBER SECURITY</title>
      <dc:creator>JOHNMARY-BORNICA-PRINCE19</dc:creator>
      <pubDate>Tue, 13 Feb 2024 11:37:46 +0000</pubDate>
      <link>https://dev.to/johnmarybornicaprince19/introduction-to-cyber-security-3506</link>
      <guid>https://dev.to/johnmarybornicaprince19/introduction-to-cyber-security-3506</guid>
      <description>&lt;p&gt;In the current digital environment, cyber security has emerged as a major worry for businesses all around the world. Because cyberattacks are becoming more frequent and sophisticated, companies are always looking for reliable ways to protect their networks, systems, and data. Linux, which is well-known for its adaptability and security capabilities, is essential for  cyber defenses. This introductory article examines the relationship between Linux administration and cyber security, outlining recommended procedures and tactics to reduce risks and improve resilience. I will be basing on the frequently used books to share some of the best practices used by System Administrators and how they can protect themselves from attacks. I will also show some of the tactics used by cyber criminals....of course not all but we shall continue to explore together basing on the available sources    .&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Understanding the Cyber Security Landscape:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Cyber threats continue to evolve, encompassing a myriad of attack vectors such as malware, phishing, ransomware, and DDoS attacks.&lt;br&gt;
Linux systems, although inherently secure, are not immune to vulnerabilities. Effective cyber security measures are imperative to protect Linux-based infrastructure from potential exploits.&lt;br&gt;
Importance of Linux Administration in Cyber Security:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Linux administrators&lt;/strong&gt; serve as frontline defenders, responsible for configuring, securing, and maintaining Linux systems.&lt;br&gt;
Through adept administration practices, vulnerabilities can be identified and remediated proactively, reducing the surface area for potential attacks.&lt;br&gt;
Linux administrators play a crucial role in implementing security protocols, access controls, and monitoring mechanisms to safeguard critical assets.&lt;br&gt;
Best Practices for Cyber Security in Linux Administration:&lt;br&gt;
&lt;strong&gt;a. Regular Patch Management:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Stay abreast of security updates and patches released by Linux distributions and third-party vendors.&lt;br&gt;
Implement a systematic patch management process to promptly apply patches and mitigate known vulnerabilities.&lt;br&gt;
&lt;strong&gt;b. Harden System Configurations:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Utilize security-hardened Linux distributions or harden existing installations by disabling unnecessary services, restricting user privileges, and configuring firewalls.&lt;br&gt;
Employ tools like SELinux (Security-Enhanced Linux) or AppArmor to enforce mandatory access controls and confinement policies.&lt;br&gt;
&lt;strong&gt;c. Implement Secure Authentication Mechanisms:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Utilize strong password policies, multi-factor authentication (MFA), and SSH key-based authentication to fortify access controls.&lt;br&gt;
Employ centralized authentication systems like LDAP (Lightweight Directory Access Protocol) or Active Directory for streamlined user management.&lt;br&gt;
&lt;strong&gt;d. Encrypt Data and Communications:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Utilize encryption mechanisms such as SSL/TLS for securing network communications and disk encryption (e.g., LUKS) for protecting sensitive data at rest.&lt;br&gt;
Implement secure communication protocols like SSH (Secure Shell) for remote administration to prevent eavesdropping and unauthorized access.&lt;br&gt;
&lt;strong&gt;e. Monitor and Audit System Activities:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Deploy intrusion detection systems (IDS), log monitoring tools, and security information and event management (SIEM) solutions to detect and respond to suspicious activities.&lt;br&gt;
Conduct regular security audits, review system logs, and analyze user activities to identify potential security incidents or policy violations.&lt;br&gt;
&lt;strong&gt;Continuous Education and Training:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Keep abreast of emerging cyber threats, security best practices, and Linux advancements through continuous education and training programs.&lt;br&gt;
Encourage Linux administrators to pursue certifications like CompTIA Linux+ or Red Hat Certified Engineer (RHCE) to deepen their expertise in Linux security.&lt;br&gt;
&lt;strong&gt;Collaboration and Information Sharing:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Foster collaboration between Linux administrators, security teams, and stakeholders to align security objectives with business goals.&lt;br&gt;
Participate in cyber security communities, forums, and mailing lists to exchange insights, share threat intelligence, and stay informed about emerging trends.&lt;br&gt;
Conclusion:&lt;br&gt;
Cyber security and Linux administration are intertwined disciplines that necessitate a holistic approach to fortify organizational defenses against evolving threats. By adhering to best practices, adopting robust security measures, and fostering a culture of vigilance and collaboration, businesses can effectively mitigate risks and safeguard their Linux-based infrastructure in an increasingly hostile cyber landscape.&lt;/p&gt;

</description>
      <category>programming</category>
      <category>security</category>
      <category>linux</category>
      <category>cybersecurity</category>
    </item>
  </channel>
</rss>
