<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: NoblePearl Aanat</title>
    <description>The latest articles on DEV Community by NoblePearl Aanat (@noblepearl).</description>
    <link>https://dev.to/noblepearl</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1294316%2F60c7f1d7-aa7d-4c25-b4df-b194941d533b.jpg</url>
      <title>DEV Community: NoblePearl Aanat</title>
      <link>https://dev.to/noblepearl</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/noblepearl"/>
    <language>en</language>
    <item>
      <title>The Pyramid of Pain: A Threat Intelligence Concept</title>
      <dc:creator>NoblePearl Aanat</dc:creator>
      <pubDate>Wed, 29 May 2024 15:07:20 +0000</pubDate>
      <link>https://dev.to/noblepearl/the-pyramid-of-pain-a-threat-intelligence-concept-5990</link>
      <guid>https://dev.to/noblepearl/the-pyramid-of-pain-a-threat-intelligence-concept-5990</guid>
      <description>&lt;p&gt;An Intelligence concept called the "Pyramid of Pain". It's a simple way to understand how to prioritize threats and make our lives easier when dealing with bad guys on the internet!&lt;/p&gt;

&lt;p&gt;The Pyramid of Pain is like a ranking system for threats. It's divided into six levels, from least to most severe:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Hash values (like a unique ID for files)&lt;/li&gt;
&lt;li&gt;IP addresses (like a computer's address)&lt;/li&gt;
&lt;li&gt;Domain names (like a website's name)&lt;/li&gt;
&lt;li&gt;Network/host artifacts (like clues left behind on a computer)&lt;/li&gt;
&lt;li&gt;Tools (like software used for good or bad)&lt;/li&gt;
&lt;li&gt;TTPs (like the tactics and techniques used by bad guys)
The levels are arranged in order of increasing severity, with TTPs being the most critical and hash values being the least. The idea is that the higher you go up the pyramid, the more critical the threat is. So, if you're dealing with a TTP, that's like the ultimate challenge!&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;So this is how they are labeled:&lt;br&gt;
TTPs: Tough&lt;br&gt;
Tools: Challenging &lt;br&gt;
Network/Host Artifacts: Annoying&lt;br&gt;
Domain Names: Simple&lt;br&gt;
IP Addresses: Easy&lt;br&gt;
Hash Values: Trivial &lt;/p&gt;

&lt;p&gt;Understanding the Pyramid of Pain helps us:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Focus on the most important threats first&lt;/li&gt;
&lt;li&gt;Stop bad guys from causing harm&lt;/li&gt;
&lt;li&gt;Learn how they work and improve our skills&lt;/li&gt;
&lt;li&gt;Get better at finding and fixing problems&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Conclusion:&lt;br&gt;
The Pyramid of Pain is a valuable tool for threat intelligence and incident response teams. By understanding the different levels of IOCs and prioritizing efforts accordingly, teams can enhance their threat mitigation and disruption capabilities. Remember, a proactive approach to threat intelligence is crucial in today's ever-evolving threat landscape.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>security</category>
    </item>
    <item>
      <title>Understanding Basic Network Devices: Hubs, Bridges, Switches, and Routers</title>
      <dc:creator>NoblePearl Aanat</dc:creator>
      <pubDate>Thu, 22 Feb 2024 22:05:15 +0000</pubDate>
      <link>https://dev.to/noblepearl/understanding-basic-network-devices-hubs-bridges-switches-and-routers-2f4p</link>
      <guid>https://dev.to/noblepearl/understanding-basic-network-devices-hubs-bridges-switches-and-routers-2f4p</guid>
      <description>&lt;p&gt;&lt;strong&gt;Hub&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In the realm of networking, hubs are the humble connectors, facilitating the interconnection of devices within a network. Operating in half-duplex mode, a hub can either send or receive data but not both simultaneously. This characteristic introduces the risk of collisions, potentially leading to data corruption. Positioned at Layer 1 of the OSI model, hubs lack intelligence regarding addresses. They simply repeat any data they receive to all connected devices, creating a shared collision domain.&lt;/p&gt;

&lt;p&gt;Despite their simplicity, hubs waste bandwidth by needlessly broadcasting data to all hosts, even if the destination is a specific device. The lack of address knowledge poses security risks, as all hosts receive data intended for a single recipient. Over time, hubs have become outdated, gradually replaced by more efficient and secure networking solutions like switches.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Bridge&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The introduction of bridges marked a significant evolution in network architecture. Bridges address some of the shortcomings of hubs by segmenting networks into smaller, more manageable sections. Unlike hubs, bridges operate at Layer 2, allowing them to understand and learn MAC addresses. When data reaches a bridge, it examines the source and destination MAC addresses, deciding whether to forward or discard the data.&lt;/p&gt;

&lt;p&gt;The dynamic learning process of bridges involves storing source addresses in a table, enabling more efficient data forwarding. Each time a bridge receives data, it updates its knowledge of connected devices, optimizing network performance. Despite their advantages, bridges have become outdated in contemporary networking environments, yielding ground to more sophisticated devices like switches.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Switch&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Considered a hybrid of hubs and bridges, switches offer advanced functionality in local area networks (LANs). A switch not only connects devices but also intelligently learns the physical addresses, or MAC addresses, associated with each port. Operating at Layer 2, switches utilize a MAC address table to direct data only to the intended destination port, minimizing unnecessary data broadcast.&lt;/p&gt;

&lt;p&gt;One notable improvement switches bring to the table is the support for full-duplex communication. This means a switch can send and receive data simultaneously, enhancing network efficiency. With each port having its collision domain, switches further enhance security and prevent data theft. Thanks to their ability to learn MAC addresses, switches save substantial bandwidth compared to their predecessors.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Router&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In the hierarchy of network devices, routers serve as the gateways between internal networks and the vast external world. Routers operate at Layer 3, utilizing both MAC and IP addresses. While MAC addresses operate at Layer 2, IP addresses are known as Layer 3 addresses. A router's primary function is to route or forward data from one network to another based on IP addresses.&lt;/p&gt;

&lt;p&gt;Unlike hubs and switches, routers have the capacity to inspect the IP address of incoming data packets. If a packet is meant for the router's internal network, it is retained; otherwise, the router forwards it to another network. This crucial ability allows routers to connect diverse networks and play a pivotal role in facilitating communication between different entities on the internet.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Differences Between Hub, Switch, and Router Devices&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Hub:&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;-Connects devices within an internal network.&lt;br&gt;
-Operates at Layer 1, lacking address knowledge.&lt;br&gt;
-Broadcasts data to all ports, lacking intelligence.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Switch:&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;-Intelligently connects devices, learning MAC addresses.&lt;br&gt;
-Operates at Layer 2, supporting full-duplex communication.&lt;br&gt;
-Directs data only to the intended destination port.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Router:&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;-Serves as the gateway between internal and external networks.&lt;br&gt;
-Operates at Layer 3, utilizing both MAC and IPIP addresses.&lt;br&gt;
-Routes data based on IP addresses, connecting diverse networks.&lt;/p&gt;

&lt;p&gt;In conclusion, while hubs and switches play roles in creating and managing local networks, routers are essential for connecting networks, enabling communication across different domains. The dynamic interplay between these devices forms the backbone of modern networking, ensuring efficient and secure data transfer.&lt;/p&gt;

</description>
      <category>beginners</category>
      <category>productivity</category>
      <category>learning</category>
    </item>
    <item>
      <title>IP Addresses: Digital Connectivity</title>
      <dc:creator>NoblePearl Aanat</dc:creator>
      <pubDate>Thu, 22 Feb 2024 20:37:16 +0000</pubDate>
      <link>https://dev.to/noblepearl/ip-addresses-digital-connectivity-jf4</link>
      <guid>https://dev.to/noblepearl/ip-addresses-digital-connectivity-jf4</guid>
      <description>&lt;p&gt;&lt;strong&gt;Title: Understanding IP Addresses: A Comprehensive Guide&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Introduction&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;The term "IP" stands for "Internet Protocol," a set of rules governing data format for communication over the Internet or a local network. It serves as a unique identifier assigned to each device connected to a computer network, akin to phone numbers for our devices. This article explores the significance, generation, and types of IP addresses, delving into the complexities that define our digital communication landscape.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;IP Address Basics&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;An IP address allows devices to connect, enabling communication over the Internet. It plays a crucial role in differentiating computers, routers, and websites. The Internet Assigned Numbers Authority (IANA), a division of the Internet Corporation for Assigned Names and Numbers (ICANN), oversees the allocation of IP addresses. The 32-bit length of an IPv4 address and its format, consisting of four sets of numbers separated by dots, are key elements that lay the foundation for our interconnected digital world.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Understanding IP Address Components&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;The subnet mask and default gateway accompany the IP address. The subnet, also known as the netmask, and the default gateway are integral for network communication. Subnet masks, often resembling IP addresses, assist in identifying network sections and host sections. For instance, the subnet mask "255.255.255.0" implies that devices within the network will have IP addresses starting with "192.168.1."&lt;/p&gt;

&lt;p&gt;&lt;em&gt;IP Address Allocation&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Wireless routers play a crucial role in IP address allocation through DHCP (Dynamic Host Configuration Protocol). The subnet mask aligns with the IP address, determining the network portion and the host portion. Recognizing the class of an IP address, whether A, B, or C, simplifies understanding.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Transition to IPv6&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;With the exhaustion of IPv4 addresses, IPv6 has been introduced to provide an abundance of IP addresses. Additionally, private IP addresses save public addresses, ensuring efficient use. The default gateway, often ending in ".1," facilitates communication beyond the local network.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Role of IP Addresses in Networking&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Layer 3 in TCP&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;The third layer in the TCP model is responsible for IP addresses. IP addresses, akin to a language for devices, facilitate communication, allowing computers worldwide to exchange information seamlessly.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;How IP Addresses Work&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;IP addresses function behind the scenes, allowing devices to communicate through set guidelines. The assignment of IP addresses, both private and public, occurs based on network locations. Devices may have dynamic or static public IP addresses, with dynamic IPs changing regularly.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Types of IP Addresses&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Consumer IP Addresses&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Individuals and businesses possess private and public IP addresses. Private IP addresses are assigned to devices within a network, while the public IP address represents the entire network. Dynamic and static public IP addresses cater to different needs.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Website IP Addresses&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;For website owners, the choice between shared and dedicated IP addresses depends on hosting plans. Shared hosting involves multiple websites on a single server, each with a shared IP address. In contrast, dedicated IP addresses are crucial for businesses hosting their servers.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Extended Discussion on IP Address Types&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Public IP addresses come in two forms – dynamic and static. Dynamic IP addresses change automatically and regularly, providing cost savings and enhanced security. Static IP addresses remain consistent, crucial for businesses hosting their servers.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How to Look Up IP Addresses&lt;/strong&gt; &lt;/p&gt;

&lt;p&gt;Checking your router's public IP address is as simple as searching "What is my IP address?" on Google. Finding private IP addresses varies by platform and can be accessed through system preferences or settings.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Extended Discussion on IP Address Lookup&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;If you need to check the IP addresses of other devices on your network, accessing the router provides a comprehensive list. Navigating to "attached devices" displays all devices recently or currently attached to the network, including their IP addresses.&lt;/p&gt;

&lt;p&gt;*&lt;em&gt;Security Concerns and Protection&lt;br&gt;
*&lt;/em&gt;&lt;br&gt;
&lt;em&gt;Criminal Exploitation of IP Addresses&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Criminals can exploit IP addresses by tracking online activities, posing risks such as location tracking and network attacks. Awareness of these risks and implementing protective measures, including proxies or Virtual Private Networks (VPNs), is crucial for safeguarding IP addresses.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Risks Include:&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Downloading illegal content using your IP address&lt;br&gt;
Tracking down your location&lt;br&gt;
Directly attacking your network&lt;br&gt;
Hacking into your device&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Protective Measures:&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;IP addresses can be protected and hidden by using a proxy server or a Virtual Private Network (VPN).&lt;br&gt;
VPNs are strongly advised in certain situations to ensure privacy.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Extended Discussion on IP Address Security&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Understanding the risks associated with IP addresses is paramount. Criminals can track down your IP address through various online activities, posing threats such as network attacks and identity impersonation. Protecting your IP address becomes essential, and measures like proxy servers and VPNs offer a shield against potential cyber threats.&lt;/p&gt;

&lt;p&gt;_Conclusion&lt;br&gt;
_&lt;br&gt;
In conclusion, IP addresses are fundamental in the digital landscape, serving as identifiers that facilitate seamless communication across networks. Understanding their intricacies, allocation methods, and potential risks is crucial in navigating the digital realm securely. The evolution of IP addresses, from IPv4 to IPv6, showcases the dynamic nature of our digital infrastructure. As we continue to rely on these unique identifiers, staying vigilant about security measures ensures a robust and protected online presence.&lt;/p&gt;

</description>
      <category>beginners</category>
      <category>productivity</category>
      <category>learning</category>
    </item>
  </channel>
</rss>
