Author: ByteMe

  • Cybersecurity Podcasts

    Last month John on Mastodon asked what podcast people were listening to. I jumped in with my list, but I learned of a lot more out there then I was aware of. Being a big podcast fan this is one of the first mediums I turned to myself when looking for information about cyber security. Since replying to that post I have built a longer list of podcasts that I listen to and podcast that I want to listen to.

    Podcast I listen to

    • Security Now – I have listened to this program for a long time. It is a weekly show that goes over the news and answers listener questions. It is part of the TWIT family of podcasts. I reccomend checking the rest of their podcasts out if you are into technology. They are wonderfully produced. This podcast is on the longer side, usually around 1.5 to 2 hours.
    • Smashing Security – This is also a weekly podcast, but has an emphasis on funny. They cover the wild part of security. The stories are always funny! This is a shorter podcast, usually under an hour. I never miss this one.
    • Risky Business – I haven’t listened to many episodes of this podcast, but I have enjoyed those I have caught. I hope to listen to many more soon.
    • Darknet Diaries – These episodes go very deep. The story telling is simply magnificent. If you only have time for one podcast in cybersecurity make it this one.
    • Paul’s Security Weekly – A quick weekly roundup of what is going on in cyber security.
    • Malicious Life – Great episodes that I found gripping. I loved the episode on SIM-swapping.
    • Hacking Humans – I’ve only caught one of these so far, I’m looking forward to listening to more though.

    Podcast I have not yet listened to

  • Book Review | Countdown to Zero Day

    Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon
    by Kim Zetter

    The Book in Three Sentences

    1. The first cyber war attack by the US targeting centrifuges in Iran.
    2. This was the first attack, but it is seen as only the beginning and shows that many systems all over the world are in danger of being exploited.
    3. Real physical destruction can be caused by a malicious computer code.

    Impressions

    This book is not the first cyber security book I’ve read. The story telling was done well, if a little long winded, like many non-fiction books I think this book could have been condensed further. At times it read as though the author was trying to make an article into a book, but at 400 plus pages, I think there was too much repetitive content. Nonetheless, this was an interesting book and covers a pivotal part of cyber history. Stuxnet is mentioned and discussed in many of the virtual training classes I have been taking in the last few months.

    Who Should Read It

    I think there are two categories of people who would be interested in this book. One being history people. I fit in this category as well. This was such a pivotal part of how technology is changing modern warfare that it can’t be ignored.

    The second group that will be interested in this book are those with an interest in computers especially information security folks. This is the first virus designed specifically to target a very niche device. It was purposely written to attack, just that device to accomplish political goals.

    My Takeaways

    • It made me aware that governments can leverage malicious code to attack each other, minimizing human loss
    • I learned that governments is keeping zero days to themselves in order to carry out attacks against their enemies
  • PiHole

    The purpose of this project was to get a deeper understanding of DNS and networking. It also helped with many unix commands.

    What is a PiHole?

    The Pi-hole is a DNS sinkhole that protects your devices from unwanted content, without installing any client-side software. It can be installed as a docker component or on a raspberry pi.

    I had a old raspberry pi sitting around that I had configured for the kids as a retropi, but they were not using it so I decided to do this project to learn something as well as increase the privacy of the entire house. Since getting people to be secure is hard, I’m trying instead to keep the place that they do most of their internet browsing to be more secure.

    How to set up a PiHole

    I primary used this video and the documentation that they put together. It worked without issue.

    How to Create a PiHole

    This was a fun and education project because not only did I learn more about DNS. I got to play with setting up DHCP reservations, customizing my DNS servers on the DHCP server. I also never attached the raspberry pi to a monitor or keyboard, I used SSH to connect to it and do all the operations for this tutorial.

    I highly recommend this project for fun and for a chance to educate yourself with a hands on project! After setting this all up I learned that my smart TV (Samsung) was sending out 7k request an hour. I wasn’t even using the smart features! We have a AppleTV hooked up to the TV so I just unplugged the Ethernet cable on our TV. It is amazing and surprising to see what request are flowing across your network.

  • Weekly Cyber Security Wrap-up 2/13

    Articles

    Podcasts

    • Smashing Security – 308: Jail after VPN fail, criminal messaging apps, and wolf-crying watches
    • Security Now 910 – Malicious ChatGPT Use, Google Security Key Giveaway, OTPAuth

    Projects

    TryHackMe – I paid for premium access and completed the Introduction to Cybersecurity and Pre Security learning paths.

    PiHole – I used this great tutorial to create a PiHole.

  • Weekly Cybersecurity Wrap-Up – 2/6/23

    Webinars

    Articles

    Podcasts

    • Chat-GPT Seinfeld, QNAP, Google FI, Headcrab, Banner, GoodRx, Oracle, & GoAnywhere – SWN #271 – Security News Doug Chides: Chat-GPT, QNAP, Google FI, REDIS, Headcrab, Banner, GoodRx, Oracle, GoAnywhere, & more!
    • Malicious Life 206 – The (Other) Problem with NFTs
    • Smashing Security 307: ChatGPT and the Minister for Foreign Affairs
    • Security Now 909 – How ESXi Fell – EU Internet Surveillance, QNAP returns, .DEV is always HTTPS

    Projects

    TryHackMe – Completed the “Walking and Application Room”

    PluralSight Learning

    Risk Management and Information Systems Control: Risk and Control Monitoring and Reporting – 48m – Addresses the risk management lifecycle.

  • Cori Brown Hacks David Bombal

    This is a very interesting video where Cori walks David through how to do phishing and she made it look so easy. Fast too!

    Phishing Demo
  • Weekly Cybersecurity Wrap Up 1/30/23

    A weekly roundup of my continued learning in cybersecurity. What webinars I attended, podcast I listened to, the articles I read and projects I’m working on.

    Webinars

    Articles

    Podcasts

    • Smashing Security – 306: No Fly lists, cell phones, and the end of ransomware riches? – What are prisoners getting up to with mobile phones? Why might ransomware no longer be generating as much revenue for cybercriminals? And how on earth did an airline leave the US government’s “No Fly” list accessible for anyone in the world to download?
    • Malicious Life – You Should Be Afraid of SIM Swaps – If SIM swap stories ever make the news, almost uniformly, they focus on people who lost a lot of money. But SIM swaps also take a psychological toll. Getting cut off from the grid all of a sudden, not knowing why, not being able to call for help. Even when it’s over, you never know if your attackers — whoever they are — will come back again.
    • Security Masterminds – Why a Data-Driven cybersecurity Defense Will Protect Your Organization With Special Guest, Roger Grimes – Excellent podcast, bit of John McAfee bashing, not that it wasn’t deserved. Get past that and the content is great.
    • Security Weekly News – SWN #269 – Empathy, Bitwarden, Lexmark, Exchange, Dragonbridge, & Derek Johnson Talks About Hive
    • Security Weekly News – SWN #270– SwiftSlicer, vRealize, Google Play, KeePass, Huawei, & Github –
    • Security Now 908 – Data Operand Independent Timing – Old Android apps, Kevin Rose, iOS 6.3 and FIDO, Hive hacked

    Projects

    TryHackMe – This week I focused on the How the Web Works. I’m working through the HTTP in Detail room.

    Pluralsight Learning

  • What is Mastodon?

    What is Mastodon in 180 Seconds

    I’m loving mastodon and I’m huge fan. With everyone comparing it to Twitter it makes describing it more challenging. You have to forget the idea of Twitter to really understand it. This video does a great job of quickly describing it.

  • Deep Dive on Password Best Practices

    On Tuesday, I attended a wonderful talk by Roger Grimes. The title of the webinar was A Master Class on Cybersecurity: Password Best Practices. Roger is very knowledgeable and a great resource for this information, but he talks fast. I really enjoyed the webinar, but it was an hour long and Roger fit a lot in that hour. For those that watch the above free webinar provided by BightTalk and (ISC)2. I thought I would provide some helpful links and videos to follow along in the webinar. First be sure to download the slides from Roger’s talk via BrightTalk.

    Roger shows several Kevin Mitnick hacks during the webinar. Here is the No Link or Attachments Necessary hack link, unfortunately its not on youtube, so no embedding. Kevin is the “Chief Hacking Officer” at KnowBe4, the same company that Roger Grimes works at.

    After the talk I also looked up my email address on haveibeenpwned.com. No surprises here. My email was in several breaches.

    If they have your username they have half the puzzle (assuming you are not using any kind of 2 factor authentication, 2FA, which most are not). Now all they have to do is guess your password. If your password is on this list, Top 200 most common passwords, your screwed, this is exactly the kind of list that hackers will use first.

    How do you make a more secure password then. I’ll let Kevin touch on this:

    How Easy It Is to Crack Your Password

    It is really even easier than that! If you ask chances are people will freely give you their password:

    What’s Your Password?

    Okay, so let’s assume you are smarter than these folks and you can keep from freely telling people. But can you? You may be doing it, indirectly. According to a research paper from Google, 20% of recovery questions, those you answer when you use the Forgot Password link on every website, can be guessed by a hacker. But while the hacker can do it, 40% of users can’t remember their own according to the paper! When all else fails just review your social media, as 16% of answers can be found there!

    My suggestion use a password manager. Then you say, what about LastPass. You have a point, but how often are password managers breached? Not as often as the other 100 sites you use a password to get into. Password managers are still a good choice. In addition to your password manager, why not try some 2FA hardware?

    You Should Be Using Yubikeys!

    Be safe out there folks!

  • Weekly Cyber Security Wrap Up

    My weekly roundup of my continued learning in cyber security. What webinars I attended, podcast I listened to, the articles I read and projects I’m working on.

    Webinars

    • Roger A. Grimes, KnowBe4’s Data-Driven Defense Evangelist – (ISC)2 – A Master Class on Cybersecurity: Password Best Practices01/24/23 – What really makes a “strong” password? And why are you and your end-users continually tortured by them? How do hackers crack your passwords with ease? And what can/should you do to improve your organization’s authentication methods? Password complexity, length, and rotation requirements are the bane of IT departments’ existence and are literally the cause of thousands of data breaches. But it doesn’t have to be that way! –

    Security Briefings Webinars | (ISC)²

    • Rachel Tobac, CEO of SocialProof Security – Webinar: Personal Data’s Role in Enterprise Social Engineering Attacks – 01/25/23 – During this webinar, Rachel and Rob will share their unique perspectives on: The state of privacy: Why individuals are losing control of their digital identities and how that’s driving business risk. The state of social engineering: How hackers use data found by data brokers to hack. The future of hacking: How new AI-based technology like facial recognition and voice-cloning will open up new pathways for bad actors

    DeleteMe Webinar

    Articles

    Podcasts

    Projects

    TryHackMe – Completed Linux Fundamentals Parts 1-3. Completed Windows Fundamentals 1-3.

    Implementation of Secure Solutions for CompTIA Security+ – 6 hours of prep training for the Security+.