<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: TheRealChiwoo</title>
    <description>The latest articles on DEV Community by TheRealChiwoo (@therealchiwoo).</description>
    <link>https://dev.to/therealchiwoo</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1068593%2Ffdf862b6-856a-4f7f-9f8b-c5e43fa6b1ca.jpg</url>
      <title>DEV Community: TheRealChiwoo</title>
      <link>https://dev.to/therealchiwoo</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/therealchiwoo"/>
    <language>en</language>
    <item>
      <title>Virtual Machines</title>
      <dc:creator>TheRealChiwoo</dc:creator>
      <pubDate>Wed, 13 Sep 2023 02:10:50 +0000</pubDate>
      <link>https://dev.to/therealchiwoo/virtual-machines-156j</link>
      <guid>https://dev.to/therealchiwoo/virtual-machines-156j</guid>
      <description>&lt;p&gt;&lt;strong&gt;Brief Overview&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Hello everybody! I haven't been awake this early in quite a while, so I decided to be a nerd and hop on DEV to create a post dedicated to virtual machines. As many of you guys know, there are different types of operating systems (windows, macOS, linux... etc). In this post, I have the joy of working through a task I was given by my boss Roman (shoutout again). With little to no knowledge about them, this was my best attempt at it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Task&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Before I start breaking down what I did, let's take a look at the task I was given!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--hqnj4i-g--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/m7777zki8bvxwu0vq4hu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--hqnj4i-g--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/m7777zki8bvxwu0vq4hu.png" alt="Image description" width="800" height="83"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Hmm... okay. Initially, I had a couple of thoughts that came into my head.&lt;/p&gt;

&lt;p&gt;????????????????????????????????????&lt;/p&gt;

&lt;p&gt;Ok, let's break this down now, step by step! (OOH BABYYY)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Download the virtual machines.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This step isn't too hard, I decided to use Oracle VM Virtualbox (&lt;a href="https://www.virtualbox.org/wiki/Downloads"&gt;https://www.virtualbox.org/wiki/Downloads&lt;/a&gt;) and downloaded the earliest version. To be honest, I already had Virtualbox downloaded as I used to for &lt;em&gt;hackthebox&lt;/em&gt;, but it's quite easy to download!&lt;/p&gt;

&lt;p&gt;Next, I downloaded the 3 following OS onto Virtualbox: Windows, Kali and Ubuntu.&lt;/p&gt;

&lt;p&gt;Downloading them wasn't too difficult as there were lots of online videos/tutorials showing me how, but it was a little annoying setting up each VM as the settings that were shown in the tutorial were for different computers. As for me, I already had Kali installed on my VM, but the other two weren't hard to find.&lt;/p&gt;

&lt;p&gt;Windows: &lt;a href="https://developer.microsoft.com/en-us/windows/downloads/virtual-machines/"&gt;https://developer.microsoft.com/en-us/windows/downloads/virtual-machines/&lt;/a&gt;&lt;br&gt;
Ubuntu: &lt;a href="https://ubuntu.com/download/server"&gt;https://ubuntu.com/download/server&lt;/a&gt;&lt;br&gt;
Kali: &lt;a href="https://www.kali.org/get-kali/#kali-platforms"&gt;https://www.kali.org/get-kali/#kali-platforms&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Setting up the virtual machines could be hassle, but make sure to watch some tutorials on YouTube! It saves you the trouble of trying to figure it out on other websites!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Install and configure Apache on the Ubuntu VM.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;What is Apache you ask? Well, Apache is the most frequently used web server on Linux (which are used to serve web pages requested by client computers), which is why we need to set it up. You'll see on step 4 :).&lt;/p&gt;

&lt;p&gt;First, I opened up the terminal in Ubuntu and typed these 3 commands:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--2DdR0GBI--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/g75d8345n0kacm61tjca.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--2DdR0GBI--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/g75d8345n0kacm61tjca.png" alt="Image description" width="591" height="347"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now that I have Apache installed, time to configure the firewall to allow HTTP traffic:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--_Lt1y4zB--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/2iuaph26o4psltmh4y4z.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--_Lt1y4zB--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/2iuaph26o4psltmh4y4z.png" alt="Image description" width="564" height="331"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Alright! Now since that's done, let's download the MySQL database.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Install and configure MySQL on the windows VM.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;First, download and install the MySQL Server for Windows from the website: &lt;a href="https://dev.mysql.com/downloads/windows/installer/"&gt;https://dev.mysql.com/downloads/windows/installer/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;For the settings, make sure to do these things!&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Server-only installation.&lt;/li&gt;
&lt;li&gt;Set up strong root password.&lt;/li&gt;
&lt;li&gt;Configure the Windows firewall to allow MySQL traffic by creating an inbound rule.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Once those steps are complete, it's time to move on to the next step!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. Configure the WordPress server.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;First Apache... and now... What the hell is WordPress?&lt;br&gt;
&lt;a href="https://kinsta.com/knowledgebase/what-is-wordpress/"&gt;https://kinsta.com/knowledgebase/what-is-wordpress/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;On Kinsta, it explains WordPress as "the simplest, most popular way to create your own website or blog". Basically, it is a content management system that allows you to host and build your own websites!&lt;/p&gt;

&lt;p&gt;Ok, now onto actually configuring it:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--rtbp5RL9--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/c4gsub2zpr0hf4ib3yzg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--rtbp5RL9--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/c4gsub2zpr0hf4ib3yzg.png" alt="Image description" width="598" height="328"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After running those commands, download the latest WordPress release from the website: &lt;a href="https://wordpress.org/download/"&gt;https://wordpress.org/download/&lt;/a&gt;.&lt;br&gt;
Once downloading is complete, make sure to extract it to the Apache web server document root directory! (/var/www/html/).&lt;/p&gt;

&lt;p&gt;This step was a little difficult for me and actually took a couple of days! For some reason, I was able to ping my Ubuntu VM from my Windows VM, but not vice versa. My VM's weren't able to talk to each other! Luckily, I had some help from YouTube and my Dad, and was able to figure it out by changing some settings within the Virtualbox itself, and playing around with each VM. If you want to see all the resources I looked at, I'll leave a google document with everything in it here: &lt;/p&gt;

&lt;p&gt;&lt;a href="https://docs.google.com/document/d/1TV0G5exJOmv-ZgnQBiOwrf7VfBZswzJpnV_JKDFToAA/edit?usp=sharing"&gt;https://docs.google.com/document/d/1TV0G5exJOmv-ZgnQBiOwrf7VfBZswzJpnV_JKDFToAA/edit?usp=sharing&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;5. Use ngrok to make the WordPress instance accessible from the internet.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Oh man, another difficult word I do not understand. Ngrok allows us to instantly open access to remote systems without the troubles of touching any of our network settings or opening any ports on your router. In other words, it is a highly secure platform for remote access!&lt;/p&gt;

&lt;p&gt;Firstly, I went onto the official ngrok website (&lt;a href="https://ngrok.com/"&gt;https://ngrok.com/&lt;/a&gt;) to install it. &lt;/p&gt;

&lt;p&gt;After the download is complete, I opened my terminal and ran this command to expose the local WordPress instance to the internet:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Qfj9QqvD--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/jrswh94wr4m9danjd3u6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Qfj9QqvD--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/jrswh94wr4m9danjd3u6.png" alt="Image description" width="528" height="175"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Once it is entered, you should see something like this:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--XVeKGc-4--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/k3s9ounpc4ymsz9orhls.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--XVeKGc-4--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/k3s9ounpc4ymsz9orhls.png" alt="Image description" width="800" height="270"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Make sure to take a screenshot or mental note of the public URL provided by ngrok, as it will forward incoming HTTP traffic to your local WordPress instance!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;6. Generate a packet capture using Wireshark or TCPDump.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This step is a little more versatile as there are two different programs that allows you to capture packets from a network connection. It's main usage is network troubleshooting, analysis, software and communications protocol development as it allows you to analyze network traffic!&lt;/p&gt;

&lt;p&gt;As for me, I tried to use Wireshark but had trouble actually finding the interfaces that connected the MySQL database VM and the Apache server VM. After changing the settings in the Oracle Virtualbox to &lt;em&gt;Host only adapter&lt;/em&gt; in the network section, I wasn't able to see the interfaces. If you do happen to use Wireshark, be on the lookout for interface names like eth0, enp0s3, or enp0s8 as it should look very similar to it.&lt;/p&gt;

&lt;p&gt;Anyways, I ended up using tcpdump instead. After downloading the file online, I was able to install it through the terminal, using these commands:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--PLjrrb6R--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/y19ejh1fh5i430mo6czg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--PLjrrb6R--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/y19ejh1fh5i430mo6czg.png" alt="Image description" width="561" height="330"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Lastly, I was able to capture packets using this command:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--MMlNiHd9--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/16ukm1xnocrmvc32wkwv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--MMlNiHd9--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/16ukm1xnocrmvc32wkwv.png" alt="Image description" width="610" height="245"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If you have trouble finding your interface name, type "ifconfig" into the terminal, and find the appropriate interface name to start capturing packets.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;7. Access the WordPress site from the browser in the Kali machine.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The last and final step to this accursed step... This one is quite easy!&lt;/p&gt;

&lt;p&gt;Remember back in step 1 where I told you to download 3 different types of VM's on Virtualbox? Well now we are going to use Kali.&lt;/p&gt;

&lt;p&gt;After logging into Kali, open firefox, or any browser you want. Now think back to step 5 where I told you to take a screenshot of the URL... Just copy and paste it into the browser! &lt;/p&gt;

&lt;p&gt;If working correctly, the page should load and you should be able to access the WordPress site from the Kali machine as well:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--xcsf4DHS--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/cuhsxopsu9d7jj0osd3z.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--xcsf4DHS--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/cuhsxopsu9d7jj0osd3z.png" alt="Image description" width="800" height="496"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Final Thoughts &amp;amp; Closing Statements&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;So, the journey has come to an end. I can't lie, it was stressful trying to do everything from scratch, especially when I had almost no knowledge about anything. To be completely honest, this blog should be even longer, as there were like 5+ more steps that I had to do... but we can cover that on a different day! Remember, learning things take time, and with week 2 of my internship slowly coming to a close, I guess everything paid off.&lt;/p&gt;

</description>
      <category>virtualmachine</category>
      <category>ubuntu</category>
      <category>mysql</category>
      <category>ambatukam</category>
    </item>
    <item>
      <title>CTF Challenges: Reconnaissance</title>
      <dc:creator>TheRealChiwoo</dc:creator>
      <pubDate>Wed, 13 Sep 2023 02:10:44 +0000</pubDate>
      <link>https://dev.to/therealchiwoo/ctf-challenges-reconnaissance-1bl5</link>
      <guid>https://dev.to/therealchiwoo/ctf-challenges-reconnaissance-1bl5</guid>
      <description>&lt;p&gt;&lt;strong&gt;Brief Overview&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Now that our previous challenge has been solved, it's time to move on to the next topic. Like I mentioned before, MetaCTF provides 8 different topics of CTF problems, and this time, we are going to take a look at Reconnaissance.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What is Reconnaissance?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;For big words like this, I swear Google is my best friend. In Cybersecurity, Reconnaissance is the information-gathering stage of ethical hacking, where you collect data about the target system. To simply put, we use techniques like foot printing and scanning to discover and collect information about a system! Think of it as... I guess a hacker gathering/collecting information about the target system!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;CTF Reconnaissance Problems&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;For this section, I'm going to do a super duper easy peasy simple problem that allows you to understand the very basic definition of Reconnaissance, and a more difficult problem that can demonstrate the subject differently.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;KANYE WEST???&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Ok, let's take a look at this easy problem.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5oh627gxfczvi2h9uknk.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5oh627gxfczvi2h9uknk.png" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;As mentioned previously, ethical hackers use reconnaissance to gather information about their target. In this instance, it is the Ye himself!&lt;/p&gt;

&lt;p&gt;This problem shows the surface level definition of reconnaissance, as it makes us gather information about Kanye's iPhone password. With a simple Google search, we find his password: 000000.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Under ATT&amp;amp;CK&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Now onto something a little more difficult...&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fn1a55gwrj307rg92ffr1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fn1a55gwrj307rg92ffr1.png" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;At first, I had a difficult time understanding the problem. It had too many acronyms that I wasn't familiar with, so I decided to click on the hint: &lt;a href="https://attack.mitre.org" rel="noopener noreferrer"&gt;https://attack.mitre.org&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;When I went on the website, there was a subsection that specifies 3 different categories for attacks: Enterprise, Mobile, and ICS. &lt;/p&gt;

&lt;p&gt;Going back to the CTF problem, it states &lt;em&gt;"what other Initial Access mechanism did the attacker use?"&lt;/em&gt; When browsing through the 3 subcategories, I wasn't particularly sure on which one to click. With a little more research, I stumbled across this website: &lt;a href="https://www.blackberry.com/us/en/solutions/endpoint-security/mitre-attack" rel="noopener noreferrer"&gt;https://www.blackberry.com/us/en/solutions/endpoint-security/mitre-attack&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;In the website, it mentions that the Enterprise ATT&amp;amp;CK Matrix contains a sub-matrices that focuses on pre-attack activities (PRE Matrix), attacks against specific OS (Windows, Linux, and macOS Matrices), network infrastructure attacks (Network Matrix), cloud infrastructure attacks (Cloud Matrix), and attacks against containers (Containers Matrix). &lt;/p&gt;

&lt;p&gt;When going back to the question, it does seem like the problem wants us to research more into the Enterprise tactics.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgwnl2zdevo2a4bycnu2g.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgwnl2zdevo2a4bycnu2g.png" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;When I click on the Enterprise Tactics, there are a lot of sections within it. The CTF problem states that there was a "Valid Accounts" technique, and another technique with Initial Access Mechanism.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvzamg157q39qdt0esqnb.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvzamg157q39qdt0esqnb.png" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After clicking on the Initial Access, there were a total of 9 techniques I found. I was able to narrow it down because the CTF problem stated the Threat Actor was able to get onto our network by using a VPN, which was the "External Remote Services: T1133".&lt;/p&gt;

&lt;p&gt;This problem did take a lot of time, as I was a little bit confused on the 3 sections: Enterprise, Mobile and ICS. &lt;/p&gt;

</description>
      <category>beginners</category>
      <category>cybersecurity</category>
      <category>reconnaissance</category>
      <category>ctf</category>
    </item>
    <item>
      <title>CTF Challenges: Forensics</title>
      <dc:creator>TheRealChiwoo</dc:creator>
      <pubDate>Wed, 13 Sep 2023 02:10:37 +0000</pubDate>
      <link>https://dev.to/therealchiwoo/ctf-challenges-forensics-4o38</link>
      <guid>https://dev.to/therealchiwoo/ctf-challenges-forensics-4o38</guid>
      <description>&lt;p&gt;&lt;strong&gt;Brief Overview&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;About 2 months has passed since my first post, and I guess you could say that I took a long hiatus. Firstly, the summer has now started, and I am now interning at MetaCTF, a Capture-the-flag development company where I (as an intern) create/solve different CTF problems. I'll probably write more about different things I learn as an intern, but for now, I believe I will be working as a "Content Development Intern" as well as a "Software Development Intern". Currently, there are 8 categories within the MetaCTF challenges, and today I will talk about Forensics.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What is Forensics?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Ok... so what is it? Forensics is the science of collecting, inspecting, interpreting, reporting, and presenting computer-related electronic evidence. To simply put, you're basically an online detective who deals with locating the data that was compromised during a cyber attack!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Can PowerShell please join us on the stage?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Now that we know what the category can cover, let's do some actual CTF problems to help us better understand the field.&lt;/p&gt;

&lt;p&gt;This problem was recommended to me by my boss (shoutout Roman).&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fs0tqrfw4iw3sf6dv9udr.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fs0tqrfw4iw3sf6dv9udr.png" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The problem mentions a "powershell command", and by looking at the command, it seems like it is a window's terminal command. As a beginner, I'm not particularly sure what the command does, so a quick google search won't hurt!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj2ds2jzb2qcl8p0utjtg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj2ds2jzb2qcl8p0utjtg.png" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;One of the first websites that pop up is... malwarebytes? I guess it is malicious huh... Anyways, it does say "[System.Convert]::FromBase64String($a)" in the post. It seems like the big string given in the problem needs to be decoded with something, so let's open up a tool that will allow us to convert it!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmfa2f45bt05vhhcsa81v.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmfa2f45bt05vhhcsa81v.png" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;AHHHH HAAAAA!!!!!! I guess we found the flag! The first problem didn't seem too difficult... But on to the next!&lt;/p&gt;

</description>
      <category>beginners</category>
      <category>cybersecurity</category>
      <category>forensic</category>
      <category>cyberforensics</category>
    </item>
    <item>
      <title>CTF Challenges: Forensics</title>
      <dc:creator>TheRealChiwoo</dc:creator>
      <pubDate>Tue, 13 Jun 2023 18:18:10 +0000</pubDate>
      <link>https://dev.to/therealchiwoo/ctf-challenges-forensics-1kan</link>
      <guid>https://dev.to/therealchiwoo/ctf-challenges-forensics-1kan</guid>
      <description>&lt;p&gt;&lt;strong&gt;Brief Overview&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;About 2 months has passed since my first post, and I guess you could say that I took a long hiatus. Firstly, the summer has now started, and I am now interning at MetaCTF, a Capture-the-flag development company where I (as an intern) create/solve different CTF problems. I'll probably write more about different things I learn as an intern, but for now, I believe I will be working as a "Content Development Intern" as well as a "Software Development Intern". Currently, there are 8 categories within the MetaCTF challenges, and today I will talk about Forensics.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What is Forensics?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Ok... so what is it? &lt;em&gt;Forensics&lt;/em&gt; is the science of collecting, inspecting, interpreting, reporting, and presenting computer-related electronic evidence. To simply put, you're basically an online detective who deals with locating the data that was compromised during a cyber attack! &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;CTF Forensics Problem&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Now that we know what the category can cover, let's do some actual CTF problems to help us better understand the field. &lt;/p&gt;

&lt;p&gt;&lt;em&gt;This problem was recommended to me by my boss (shoutout Roman).&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--ZrKhHsOE--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/tad1fo0f0je6lpshiqnr.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--ZrKhHsOE--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/tad1fo0f0je6lpshiqnr.png" alt="Image description" width="800" height="218"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The problem mentions a "powershell command", and by looking at the command, it seems like it is a window's terminal command. As a beginner, I'm not particularly sure what the command does, so a quick google search won't hurt!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--2O2LUGJE--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/trcy4ln62djqsznbaifu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--2O2LUGJE--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/trcy4ln62djqsznbaifu.png" alt="Image description" width="800" height="208"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;One of the first websites that pop up is... malwarebytes? I guess it is malicious huh... Anyways, it does say "[System.Convert]::FromBase64String($a)" in the post. It seems like the big string given in the problem needs to be decoded with something, so let's open up a tool that will allow us to convert it!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--rMGRwISg--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/26b3bqis8keg4kwu1jh6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--rMGRwISg--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/26b3bqis8keg4kwu1jh6.png" alt="Image description" width="800" height="392"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;AHHHH HAAAAA!!!!!! I guess we found the flag! The first problem didn't seem too difficult... But on to the next!&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Starting from nowhere</title>
      <dc:creator>TheRealChiwoo</dc:creator>
      <pubDate>Thu, 20 Apr 2023 16:22:14 +0000</pubDate>
      <link>https://dev.to/therealchiwoo/starting-from-nowhere-4nc9</link>
      <guid>https://dev.to/therealchiwoo/starting-from-nowhere-4nc9</guid>
      <description>&lt;p&gt;Starting a blog... I haven't done anything like this since I was a kid, but I do want to track my progress. &lt;/p&gt;

&lt;p&gt;So lets start with an introduction, shall we?&lt;/p&gt;

&lt;p&gt;My name is Chiwoo Chang, and I am a CS student at the University of Virginia. I am majoring in Computer Science, and minoring in Data Science, and am planning on obtaining the Cybersecurity Certificate at the end of the year.&lt;/p&gt;

&lt;p&gt;I feel like one of the biggest factors that lead people to stop doing anything is the fear of the unknown. Beginning from nowhere. Well, I guess I'm doing exactly that. I do have some brief/basic knowledge of Cybersecurity concepts, but basically 0 technical skills. Shoutout to my friend &lt;a class="mentioned-user" href="https://dev.to/sshad0w"&gt;@sshad0w&lt;/a&gt; for putting me on, but lets start by practicing the basics. &lt;/p&gt;

&lt;p&gt;I also will upload progress videos on my youtube, so check that out. All my links are on it as well.&lt;/p&gt;

&lt;p&gt;YT - &lt;a href="https://www.youtube.com/channel/UCCS-q7NCUlINQlXdAntUI1Q"&gt;https://www.youtube.com/channel/UCCS-q7NCUlINQlXdAntUI1Q&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>beginners</category>
      <category>hackthebox</category>
      <category>uva</category>
    </item>
  </channel>
</rss>
