Category: cybersecurity

  • Splunk

    One of the goals I have set myself is becoming core user certified for splunk. I’ve already begun taking the classes, but I found them a bit lacking and I’m someone who learns best by doing so I decided to install a Ubuntu VM and get Splunk up and running on it. It was simpler than I thought. Here is how I did it.

    I followed this video for the install
    Downloading Splunk
    Downloading Splunk

    I followed this great youtube video that is only 5 minutes long! I know! Insane. It really is not that difficult. The image above shows the download.

    Successful Installation
    Successful Installation

    You set up the username and password for Splunk during the installation that happens in terminal.

    Installing Data
    Installing Data

    In order to actually do anything with Splunk you need data to query. So I followed these instructions on splunks site.

    They were okay but I ran into an issue where the upload kept timing out, so I found this troubleshooting guide also on their support site. How to resolve error “Upload failed with ERROR : Read Timeout for the log file” when uploading a generated alert log to Splunk?

    These instructions worked like a charm!

    Querying Splunk
    Querying Splunk

    And lastly, I was able to query Splunk successfully. Now, I can go back through the training on Splunk’s site and do the examples at the same time as the online instructors. I’m very happy this was easier than I thought.

  • Weekly Cybersecurity Wrap-up 4/23/23

    This is my weekly post containing the progress and learning that I worked on in the past week. Most of my week was spent working on internal training that my company offers. So less listed here this week.

    Webinars

    • None this week.

    Articles

    • Hackers can breach networks using data on resold corporate routers – Enterprise-level network equipment on the secondary market hide sensitive data that hackers could use to breach corporate environments or to obtain customer information.
    • Decoy Dog malware toolkit found after analyzing 70 billion DNS queries – Decoy Dog helps threat actors evade standard detection methods through strategic domain aging and DNS query dribbling, aiming to establish a good reputation with security vendors before switching to facilitating cybercrime operations.
    • Google ads push BumbleBee malware used by ransomware gangs – Bumblebee is a malware loader discovered in April 2022, thought to have been developed by the Conti team as a replacement for the BazarLoader backdoor, used for gaining initial access to networks and conducting ransomware attacks.
    • Lazarus X_TRADER Hack Impacts Critical Infrastructure Beyond 3CX Breach – Lazarus, the prolific North Korean hacking group behind the cascading supply chain attack targeting 3CX, also breached two critical infrastructure organizations in the power and energy sector and two other businesses involved in financial trading using the trojanized X_TRADER application.
    • TP-Link Archer WiFi router flaw exploited by Mirai malware – The Mirai malware botnet is actively exploiting a TP-Link Archer A21 (AX1800) WiFi router vulnerability tracked as CVE-2023-1389 to incorporate devices into DDoS (distributed denial of service) swarms.
    • Hackers are breaking into AT&T email accounts to steal cryptocurrency – AT&T says cyber criminals exploited an API issue to take control of victims’ email addresses
    • Hackers Leaked Minneapolis Students’ Psychological Reports, Allegations of Abuse – In a hacking episode that is spiraling from bad to worse, cyber criminals have leaked highly sensitive documents related to droves of Minneapolis students.
    • Ukrainian arrested for selling data of 300M people to Russians – The Ukrainian cyber police have arrested a 36-year-old man from the city of Netishyn for selling the personal data and sensitive information of over 300 million people, citizens of Ukraine, and various European countries.
    • New Atomic macOS Malware Steals Keychain Passwords and Crypto Wallets – Threat actors are advertising a new information stealer for the Apple macOS operating system called Atomic macOS Stealer (or AMOS) on Telegram for $1,000 per month, joining the likes of MacStealer.
    • Major UK banks including Lloyds, Halifax, TSB hit by outages – Websites and mobile apps of Lloyds Bank, Halifax, TSB Bank, and Bank of Scotland have experienced web and mobile app outages today leaving customers unable to access their account balances and information.
    • Israel’s Prime Minister has his Facebook account hijacked, website knocked offline – the Facebook account of Israel’s Prime Minister was hijacked (albeit briefly) by unauthorized parties who managed to update it with a video of prayers at a mosque, accompanied by Arabic verses from the Quran.

    Podcasts

    Projects

    • TryHackMe – SOC Level 1 – Network Security and Traffic Analysis – I started working in the Snort room this week.
  • PentestGPT

    It’s a thing officially. PentestGPT is a penetration testing tool powered by ChatGPT designed to automate the penetration testing process.

    PentestGPT
    PentestGPT Example
  • Interactive Breach Storyline

    You are the CTO of a company. You need to make the right decisions to protect the company. Good luck!

  • Military Cyber Warfare Game

    Test your knowledge about the cyberspace domain and learn about U.S. Military cyberdefense.

  • DevSecOps Training – Data Center Attack: The Game

    In this interactive video based game you are a CISO for a hospital and need to make decisions to protect this hospital from cyber attack. Think choose your own adventure video game. I really enjoyed this way of learning and I think you will too. Good luck.

  • MITRE Cyber Threat Intelligence Explained

    Great video explaining Cyber Threat from MITRE
  • Weekly Cybersecurity Wrap-up 4/16/23

    Webinars

    • Zero Trust Metrics: Track Progress and Program Maturity – The CISA Zero Trust Maturity Model is filled with concepts and language appropriate for federal agencies, but it doesn’t always translate to the private sector, and certainly not to smaller, less-mature mid-market organizations.
    • (ISC)2 Los Angeles Chapter Meeting

    Articles

    Podcasts

    Projects

    TryHackMe – Finished Open CTI and MISP rooms as part of the SOC Analyst learning path, which completes the cyber threat intelligence section. Next is network security and traffic!

  • How to get Started in Cybersecurity / Information Security

    These two terms are used interchangeably from most of what I see out there, thats why I’ve put them together like this in the title. I know people have strong feelings about this, but the reason I do this is to make sure every who is looking for this information can find it easily.

    For those who follow this blog you will notice that I usually post all articles / white papers in my weekly wrap-up post. I’m posting this separately because I think it deserves its own post. This is a very comprehensive article by Byte Breach. I encourage anyone interested to read and work through this article. Good luck all!

  • Book Review: The Art of Invisibility

    The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data by Kevin D. Mitnick

    The Art of Invisibility: The World’s Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data by Kevin D. Mitnick

    The Book in 3 Sentences

    1. Kevin Mitnick is a famous hacker, who teaches you how to reduce your attack surface in this book.
    2. Any privacy you think you have is false.
    3. While some of this information is dated, the book was published in 2017, it still has a lot of useful information.

    Impressions

    While I knew most of what was covered in this book, I did still find the content interesting. The little stories that Mitnick shares throughout the book were very interesting. Also, the length that one has to go to remain anonymous in our digital world, even back in 2017 is pretty crazy. I don’t believe that many American’s understand the amount of their privacy they are giving up by maintaining their current lifestyle, including participating in social media and using technology. Mostly, we have given up data about us, what we do online, by using tools like google, gmail, cellular phones, etc.

    Who Should Read It?

    While I think that this book is overkill for most, as most people don’t think that what they are doing is giving up their data. They believe as Mitnick points out that no one cares about what they are doing because they are just one of the 8 billion people on the planet. Hacker’s are going to over after the low-hanging fruit. They will not only attack large companies, data shows that they are attacking SMBs and individuals. Everyone should be aware, but this book is going to scare people and I believe that most people don’t have the skill set to execute Mitnick’s advise, even the minor things.

    How the Book Changed Me

    • It made me more aware of existing privacy concerns.
    • I plan to implement some of the suggestions that Mitnick discusses to protect myself and my family.