<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Ehtisham-sudo</title>
    <description>The latest articles on DEV Community by Ehtisham-sudo (@sudoehtisham).</description>
    <link>https://dev.to/sudoehtisham</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F747921%2F62d17508-7769-401c-a0e0-9ef94e6a7443.jpeg</url>
      <title>DEV Community: Ehtisham-sudo</title>
      <link>https://dev.to/sudoehtisham</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/sudoehtisham"/>
    <language>en</language>
    <item>
      <title>Penetration Testing Stages and Methodologies</title>
      <dc:creator>Ehtisham-sudo</dc:creator>
      <pubDate>Tue, 31 May 2022 18:01:44 +0000</pubDate>
      <link>https://dev.to/sudoehtisham/penetration-testing-stages-and-methodologies-3jbl</link>
      <guid>https://dev.to/sudoehtisham/penetration-testing-stages-and-methodologies-3jbl</guid>
      <description>&lt;p&gt;Penetration tests have multiple objectives and goals. Each penetration test is different based on the target scope. But there are methodologies that are same as foundational steps in order to achieve the goal. Penetration test stages:  &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Information Gathering&lt;/strong&gt;&lt;br&gt;
This stage involves collecting as much publically accessible information about a target/organisation as possible, for example, OSINT and research. this stage has two sub-branches. Active and passive information gathering.  &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Enumeration&lt;/strong&gt; &lt;br&gt;
This stage involves discovering applications and services running on the systems. For example, web server and application version detection.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Exploitation&lt;/strong&gt; &lt;br&gt;
This stage involves leveraging vulnerabilities discovered on a system or application. This stage can involve the use of public exploits or exploiting application logic.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Privilege Escalation&lt;/strong&gt; &lt;br&gt;
after gaining initial access privilege escalation helps to escalate attacker's abilities to maximum (as root or admin user).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Post-exploitation&lt;/strong&gt;&lt;br&gt;
This stage involves process to target as many system as possible and escalate the attack surface of target. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reporting&lt;/strong&gt; &lt;br&gt;
The final stage is to organize and document each step during the pentest and list all the discovered flaws and security suggestion in order to enhance the security  &lt;/p&gt;

&lt;h2&gt;
  
  
  Methodologies
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;OSSTMM&lt;/strong&gt;&lt;br&gt;
The Open Source Security Testing Methodology Manual provides a detailed framework of testing strategies for systems, software, applications, communications and the human aspect of cybersecurity. &lt;br&gt;
OSSTM is used during testing: &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Telecommunications&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Wired Networks&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Wireless Communication  &lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;OWASP&lt;/strong&gt; &lt;br&gt;
The "Open Web Application Security Project" framework is a community-driven and frequently updated framework used solely to test the security of web applications and services. &lt;br&gt;
All most all web applications are tested based on these guidelines. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;NIST Cybersecurity Framework 1.1&lt;/strong&gt;&lt;br&gt;
The NIST Cybersecurity Framework is a popular framework used to improve an organizations cybersecurity standards and manage the risk of cyber threats. This framework is a bit of an honourable mention because of its popularity and detail.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;NCSC CAF&lt;/strong&gt; &lt;br&gt;
The Cyber Assessment Framework (CAF) is an extensive framework of fourteen principles used to assess the risk of various cyber threats and an organization's defence against these.&lt;/p&gt;

</description>
      <category>security</category>
      <category>todayilearned</category>
      <category>linux</category>
    </item>
    <item>
      <title>What is Penetration Testing ?</title>
      <dc:creator>Ehtisham-sudo</dc:creator>
      <pubDate>Mon, 30 May 2022 11:26:08 +0000</pubDate>
      <link>https://dev.to/sudoehtisham/what-is-penetration-testing--3549</link>
      <guid>https://dev.to/sudoehtisham/what-is-penetration-testing--3549</guid>
      <description>&lt;p&gt;Penetration testing is a process of security audit that evaluates the organization's security, infrastructure, network and Applications against internal and external threat actors. It is helpful way to determine the security policies and controls. This process involves active evaluation of security by simulating an attack similar to real attackers. Main objectives are to test and analyze design weakness, technical flaws and vulnerabilities.  &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Security Audit&lt;/strong&gt; &lt;br&gt;
Security Audit checks whether an organization is following the standard security policies and procedures. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Vulnerability Assessment&lt;/strong&gt; &lt;br&gt;
A vulnerability assessment focus on discovering the vulnerabilities in the system but without any evidence that these can be exploited. Also it lacks the information to evaluate how much damage it can cause to the System security &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Compliance Oriented Penetration testing&lt;/strong&gt; &lt;br&gt;
This type of testing is driven by compliance requirements. It is determined to evaluate compliance requirements about standards, frameworks, laws, acts etc. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Red-Team-based Penetration testing&lt;/strong&gt; &lt;br&gt;
Red-team-based testing covers all areas of security testing. It includes assessing people, networks, application ad physical security.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Black-Box Testing&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;limited knowledge about target&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Requires a lot of research and information gathering &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Resource and time consuming &lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;White-Box Testing&lt;/strong&gt; &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Complete information about target &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Less time and resource consuming &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Bugs and vulnerabilities can be patched quickly &lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Gray-Box Testing&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Combination of black and white Testing &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;usually limited information (depends on target scope)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Security testing and assessments are performed internally &lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Basic-Skills of a Penetration Tester&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Networking (most important)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;knowledge of Firewalls, Routers and Intrusion detection systems &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Open Source Techniques&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Web Servers, mail, SNMP stations and Access devises &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Operating System knowledge &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Web Application architecture (frontend-backend,)&lt;br&gt;&lt;br&gt;
&lt;em&gt;Ability to read, learn and enhance Every day&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>linux</category>
      <category>hacking</category>
      <category>security</category>
    </item>
    <item>
      <title>Day-2 of learning Cyber Security</title>
      <dc:creator>Ehtisham-sudo</dc:creator>
      <pubDate>Sat, 28 May 2022 12:23:50 +0000</pubDate>
      <link>https://dev.to/sudoehtisham/day2-of-learning-cyber-security-93f</link>
      <guid>https://dev.to/sudoehtisham/day2-of-learning-cyber-security-93f</guid>
      <description>&lt;h2&gt;
  
  
  Computer Networking
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;OSI Model &amp;amp; TCP Model &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;DNS  and DNS types&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The life of a data packet &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Common Ports and running Services &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Cyber Security Mindset and motivation &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;A resource to understand how internet works&lt;br&gt;&lt;br&gt;
&lt;a href="https://explained-from-first-principles.com/internet"&gt;Internet explained from first principles&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Day-1 of learning Cyber Security</title>
      <dc:creator>Ehtisham-sudo</dc:creator>
      <pubDate>Fri, 27 May 2022 08:30:29 +0000</pubDate>
      <link>https://dev.to/sudoehtisham/day-1-of-learning-cyber-security-4im1</link>
      <guid>https://dev.to/sudoehtisham/day-1-of-learning-cyber-security-4im1</guid>
      <description>&lt;h2&gt;
  
  
  Linux for beginners
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Introduction to Linux &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;basic commands &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;package management &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Network configuration&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;File permissions&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Log management  &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;DNS configuration &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;A very beginner friendly resource&lt;/em&gt; &lt;br&gt;
&lt;a href="https://linuxjourney.com"&gt;https://linuxjourney.com&lt;/a&gt;&lt;br&gt;
&lt;em&gt;A website to explain commands and working process&lt;/em&gt;&lt;br&gt;
&lt;a href="https://explainshell.com"&gt;https://explainshell.com&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
