<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: 404Saint</title>
    <description>The latest articles on DEV Community by 404Saint (@null_saint).</description>
    <link>https://dev.to/null_saint</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3798991%2Ffb16aced-10b3-480d-97d0-fbfd213a8c44.jpg</url>
      <title>DEV Community: 404Saint</title>
      <link>https://dev.to/null_saint</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/null_saint"/>
    <language>en</language>
    <item>
      <title>Securing the Air-Gap: Building a Hardware-Aware Forensic Suite for ICS/OT by Rugero Tesla (404saint)</title>
      <dc:creator>404Saint</dc:creator>
      <pubDate>Mon, 13 Apr 2026 18:58:04 +0000</pubDate>
      <link>https://dev.to/null_saint/securing-the-air-gap-building-a-hardware-aware-forensic-suite-for-icsot-by-rugero-tesla-404saint-127o</link>
      <guid>https://dev.to/null_saint/securing-the-air-gap-building-a-hardware-aware-forensic-suite-for-icsot-by-rugero-tesla-404saint-127o</guid>
      <description>&lt;h2&gt;
  
  
  &lt;strong&gt;The Problem&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;In industrial environments, the "Air-Gap" is a myth as long as USB drives exist. Removable media remains the primary bridge for malicious logic (Stuxnet, etc.). Standard AV often misses the subtle indicators of industrial protocol manipulation or high-entropy obfuscation hidden in legitimate vendor installers.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Introducing Guardian-OT&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;I built Guardian-OT to provide a minimalist, high-signal audit of any drive before it touches a critical engineering workstation. It’s a part of my long-term journey into Operational Technology security.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Key Technical Pillars&lt;/strong&gt;
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;&lt;em&gt;Hardware Fingerprinting (Anti-Spoofing)&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
Instead of trusting the filesystem, the tool extracts the USB Hardware UUID and maps it against a local SQLite Vault. If the ID is unknown or doesn't match the expected hardware, the audit flags it immediately.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;&lt;strong&gt;Recursive Integrity Vault&lt;/strong&gt;&lt;/em&gt;&lt;br&gt;
Using a tree-hashing algorithm, the tool verifies every bit on the drive. If a single file has been modified since the last "known-good" scan, it triggers a deep forensic audit.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;&lt;em&gt;Deep Forensic Pipeline&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
YARA Scanning: Hunts for ICS-specific strings (Modbus, S7Comm, Ethernet/IP).&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Entropy Analysis:&lt;/strong&gt; Scores files from 0.0 to 8.0. Anything above 7.8 (like encrypted payloads or packed executables) is isolated for manual review.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Magic Number Validation:&lt;/strong&gt; Detects header/extension mismatches used to disguise scripts as documents.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;The Researcher Dashboard&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;I integrated a Streamlit-based dashboard to turn raw JSON forensic data into actionable intelligence. It allows for rapid triage, separating 1,000+ standard assets from the 10-20 "Suspicious" items that actually require a human eyes-on approach.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Why I'm Building This&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;As I work through my 4-6 year roadmap toward becoming an ICS/OT Security Researcher, I want to move beyond using tools and start building them. Guardian-OT is the first step in creating a resilient, reproducible forensic workflow for industrial environments.&lt;/p&gt;

&lt;p&gt;Check out the project on GitHub: &lt;a href="https://github.com/404saint/guardian-ot" rel="noopener noreferrer"&gt;https://github.com/404saint/guardian-ot&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>ot</category>
      <category>ics</category>
      <category>forensics</category>
    </item>
    <item>
      <title>SurfaceLens V2 — Infrastructure Attack Surface &amp; Shadow IT Intelligence Engine by Rugero Tesla (404saint)</title>
      <dc:creator>404Saint</dc:creator>
      <pubDate>Sat, 11 Apr 2026 14:07:49 +0000</pubDate>
      <link>https://dev.to/null_saint/i-built-a-modular-attack-surface-intelligence-engine-to-track-shadow-it-heres-what-i-learned-48a</link>
      <guid>https://dev.to/null_saint/i-built-a-modular-attack-surface-intelligence-engine-to-track-shadow-it-heres-what-i-learned-48a</guid>
      <description>&lt;p&gt;Most organizations don’t actually understand their infrastructure attack surface.&lt;/p&gt;

&lt;p&gt;Across enterprise networks, cloud environments, and hybrid architectures, visibility breaks down quickly. Assets drift, services get exposed, and Shadow IT emerges outside controlled network boundaries.&lt;/p&gt;

&lt;p&gt;From my work in network and infrastructure security—through hands-on lab simulations, recon workflows, and tool development—I kept running into the same limitation: we can discover assets, but we struggle to understand how they relate within an environment.&lt;/p&gt;

&lt;p&gt;I’m Rugero Tesla (404saint), and SurfaceLens V2 is my attempt to approach attack surface analysis from an infrastructure-first perspective—focusing not just on discovery, but on attribution, context, and exposure patterns.&lt;/p&gt;

&lt;h2&gt;
  
  
  What is SurfaceLens V2?
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;SurfaceLens V2&lt;/strong&gt; is a modular &lt;strong&gt;Attack Surface Management (ASM) &amp;amp; Shadow IT Intelligence Engine&lt;/strong&gt; designed to analyze infrastructure exposure across distributed environments.&lt;/p&gt;

&lt;p&gt;Instead of acting as a traditional scanner, it operates as an &lt;strong&gt;intelligence pipeline&lt;/strong&gt;—aggregating, correlating, and enriching asset data to produce structured visibility into an organization’s external footprint.&lt;/p&gt;

&lt;p&gt;The goal is simple:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Move from raw discovery to meaningful infrastructure insight.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  The Problem: Fragmented Visibility
&lt;/h2&gt;

&lt;p&gt;Modern infrastructure isn’t centralized anymore.&lt;/p&gt;

&lt;p&gt;During recon and lab simulations, I consistently observed:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Subdomains pointing to decommissioned or unclaimed infrastructure (takeover risk)&lt;/li&gt;
&lt;li&gt;Publicly exposed services (RDP, SSH, databases) outside intended boundaries&lt;/li&gt;
&lt;li&gt;Assets that belong to an organization but don’t align with its DNS patterns&lt;/li&gt;
&lt;li&gt;TLS misconfigurations and missing security controls&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Individually, these issues are well known.&lt;/p&gt;

&lt;p&gt;But together, they form something harder to detect:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;A fragmented and poorly understood attack surface.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  Design Approach: Intelligence Over Enumeration
&lt;/h2&gt;

&lt;p&gt;SurfaceLens wasn’t designed to be another high-speed scanner.&lt;/p&gt;

&lt;p&gt;Instead, I structured it as a &lt;strong&gt;multi-stage intelligence pipeline&lt;/strong&gt;.&lt;/p&gt;

&lt;h3&gt;
  
  
  1. Multi-Source Discovery
&lt;/h3&gt;

&lt;p&gt;SurfaceLens aggregates asset data from:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Shodan&lt;/li&gt;
&lt;li&gt;Censys&lt;/li&gt;
&lt;li&gt;LeakIX&lt;/li&gt;
&lt;li&gt;CriminalIP&lt;/li&gt;
&lt;li&gt;Local datasets&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This creates a diverse and provider-agnostic asset pool.&lt;/p&gt;

&lt;h3&gt;
  
  
  2. State &amp;amp; Delta Tracking (SQLite)
&lt;/h3&gt;

&lt;p&gt;One of the most important design decisions was introducing persistence.&lt;/p&gt;

&lt;p&gt;Instead of treating scans as isolated events:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Assets are stored locally&lt;/li&gt;
&lt;li&gt;First seen / last seen timestamps are tracked&lt;/li&gt;
&lt;li&gt;New exposures become immediately visible&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This transforms recon into:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Continuous infrastructure monitoring rather than one-time discovery.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  3. The Intelligence Pipeline (Core System)
&lt;/h3&gt;

&lt;p&gt;Each asset is passed through a series of modular analysis components:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;SSL Auditor&lt;/strong&gt;&lt;br&gt;
Extracts certificate data and evaluates TLS configurations&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;DNS Correlator&lt;/strong&gt;&lt;br&gt;
Performs attribution analysis to identify Shadow IT and misaligned assets&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Fingerprinter&lt;/strong&gt;&lt;br&gt;
Identifies technologies and service layers (e.g., reverse proxies, web servers)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Sensitive File Hunter&lt;/strong&gt;&lt;br&gt;
Checks for exposed files like &lt;code&gt;.env&lt;/code&gt;, &lt;code&gt;robots.txt&lt;/code&gt;, and other common leaks&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Risk Prioritizer&lt;/strong&gt;&lt;br&gt;
Assigns a weighted risk score (0–10) based on combined signals&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This pipeline is where raw data becomes structured intelligence.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Actually Matters: From Exposure to Attack Paths
&lt;/h2&gt;

&lt;p&gt;Building SurfaceLens shifted my perspective from simple discovery to structural analysis.&lt;/p&gt;

&lt;p&gt;Coming from a background in network and infrastructure research, I realized that individual findings—open ports, TLS issues, or orphaned domains—don’t mean much in isolation.&lt;/p&gt;

&lt;p&gt;What matters is how these pieces connect.&lt;/p&gt;

&lt;p&gt;When you start correlating:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;DNS attribution&lt;/li&gt;
&lt;li&gt;service exposure&lt;/li&gt;
&lt;li&gt;certificate data&lt;/li&gt;
&lt;li&gt;historical visibility&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;You begin to understand how assets fit (or don’t fit) within an environment.&lt;/p&gt;

&lt;p&gt;That’s where Shadow IT becomes visible.&lt;/p&gt;

&lt;p&gt;And more importantly:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;That’s where exposure starts turning into potential attack paths.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;This shift—from listing assets to understanding relationships—is what drives more realistic security insight.&lt;/p&gt;

&lt;h2&gt;
  
  
  Output &amp;amp; Operational Use
&lt;/h2&gt;

&lt;p&gt;SurfaceLens presents the same intelligence through multiple interfaces:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;CLI Output&lt;/strong&gt;&lt;br&gt;
Real-time, high-signal analysis for quick assessments&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Markdown Reports&lt;/strong&gt;&lt;br&gt;
Structured, audit-ready documentation&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Web Dashboard (Flask)&lt;/strong&gt;&lt;br&gt;
A centralized view of assets, risks, and historical changes&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Each interface serves a different purpose—but they all rely on the same underlying data model.&lt;/p&gt;

&lt;h2&gt;
  
  
  Design Philosophy &amp;amp; Tradeoffs
&lt;/h2&gt;

&lt;p&gt;SurfaceLens prioritizes:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Passive intelligence collection&lt;/li&gt;
&lt;li&gt;Low-noise analysis&lt;/li&gt;
&lt;li&gt;Structured correlation over raw volume&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It is intentionally not:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;an aggressive scanner&lt;/li&gt;
&lt;li&gt;or a noisy enumeration tool&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Because in real-world environments:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Clarity and context matter more than volume.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  Future Direction
&lt;/h2&gt;

&lt;p&gt;SurfaceLens V2 is a foundation, not a finished system.&lt;/p&gt;

&lt;p&gt;Areas I’m currently exploring:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Improved attribution models for asset ownership&lt;/li&gt;
&lt;li&gt;Context-aware risk scoring&lt;/li&gt;
&lt;li&gt;Integration into automated security workflows&lt;/li&gt;
&lt;li&gt;Expanded detection for infrastructure misconfigurations&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  🛡️ Ethical Use
&lt;/h2&gt;

&lt;p&gt;SurfaceLens is built for:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;defensive security research&lt;/li&gt;
&lt;li&gt;authorized assessments&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It primarily relies on passive data sources, with non-intrusive active checks.&lt;/p&gt;

&lt;p&gt;Do not use this tool on infrastructure without proper authorization.&lt;/p&gt;

&lt;h2&gt;
  
  
  Project
&lt;/h2&gt;

&lt;p&gt;Explore the project or contribute:&lt;/p&gt;

&lt;p&gt;👉 &lt;a href="https://github.com/404saint/surfacelens_v2" rel="noopener noreferrer"&gt;https://github.com/404saint/surfacelens_v2&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  👤 About the Author
&lt;/h2&gt;

&lt;p&gt;Rugero Tesla (404saint) is an offensive security researcher focused on infrastructure and network security, with a strong interest in attack surface analysis, Shadow IT discovery, and attack path modeling.&lt;/p&gt;

&lt;p&gt;His work centers around building practical tools, designing lab environments, and exploring how real-world exposure emerges across modern network architectures.&lt;/p&gt;

&lt;p&gt;GitHub: &lt;a href="https://github.com/404saint" rel="noopener noreferrer"&gt;https://github.com/404saint&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cybersecurity</category>
      <category>python</category>
      <category>opensource</category>
    </item>
    <item>
      <title>MEA – Modbus Exposure Analyzer: Passive ICS/OT Security Analysis by Rugero Tesla (404saint)</title>
      <dc:creator>404Saint</dc:creator>
      <pubDate>Sat, 28 Feb 2026 23:40:01 +0000</pubDate>
      <link>https://dev.to/null_saint/mea-modbus-exposure-analyzer-passive-icsot-security-analysis-by-rugero-tesla-404saint-3b4a</link>
      <guid>https://dev.to/null_saint/mea-modbus-exposure-analyzer-passive-icsot-security-analysis-by-rugero-tesla-404saint-3b4a</guid>
      <description>&lt;p&gt;MEA (Modbus Exposure Analyzer) is a Python-based tool I developed for assessing the exposure of Modbus devices in ICS/OT environments. It uses passive behavioral analysis, entropy measurements, and register monitoring to help security researchers, pentesters, and blue teams safely evaluate device exposure and risk. This article explains the architecture, workflow, and practical use cases of MEA.&lt;/p&gt;

&lt;p&gt;ICS/OT networks often have devices that are publicly exposed, misconfigured, or simulated. MEA helps professionals identify real vs simulated Modbus devices, assess exposure, and generate audit-ready reports — all without impacting operations.&lt;/p&gt;

&lt;p&gt;All features and code are available at &lt;a href="https://github.com/404saint/mea" rel="noopener noreferrer"&gt;MEA GitHub Repository&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Explore all my projects on GitHub: &lt;a href="https://github.com/404saint" rel="noopener noreferrer"&gt;404saint&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>security</category>
      <category>opensource</category>
    </item>
  </channel>
</rss>
