<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-8774245130267339525</id><updated>2026-01-24T17:10:09.886+11:00</updated><category term="Security"/><category term="Hacking"/><category term="Tips and Tricks"/><category term="viruses"/><category term="Job Interview and Ideas"/><category term="Teamwork"/><category term="Web Design and Development"/><category term="Windows OS"/><category term="cyber"/><category term="Freelancing"/><category term="Home based Business"/><category term="Online Earning"/><category term="Programming"/><category term="Bangladesh"/><category term="Network"/><category term="Windows 8"/><category term="IT Exam"/><category term="IT Outsourcing in Bangladesh"/><category term="Log4j"/><title type='text'>Maximus IT</title><subtitle type='html'>&lt;b&gt; Protect your digital assets with us. &lt;/b&gt; </subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://www.maximusit.net/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://www.maximusit.net/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Faysal Hasan</name><uri>http://www.blogger.com/profile/11837891241239740342</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>108</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-8774245130267339525.post-7875669715520202017</id><published>2024-07-21T03:32:00.004+10:00</published><updated>2024-07-21T03:37:58.984+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Bangladesh"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Increased risk of phishing scams following CrowdStrike outage</title><content type='html'>&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg114jiXc16Jma6UOvHnQVzD9_wEmkN_xsRAGS_EJhZbcvTvX4DIjen5b6wNAGiMFJnm2LHdK_1qlOD90FDX4gc42Pgcl1G86GpaIgEfInCD8Tj5Mj73_9gGaGRjOUzuujerAUAxgis2FYYEaK0YTc-WbI9_BYDrRtw65j7RySlKuSrnGybVzZUVhhgIKn4/s1058/Picture1.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1058&quot; data-original-width=&quot;977&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg114jiXc16Jma6UOvHnQVzD9_wEmkN_xsRAGS_EJhZbcvTvX4DIjen5b6wNAGiMFJnm2LHdK_1qlOD90FDX4gc42Pgcl1G86GpaIgEfInCD8Tj5Mj73_9gGaGRjOUzuujerAUAxgis2FYYEaK0YTc-WbI9_BYDrRtw65j7RySlKuSrnGybVzZUVhhgIKn4/s320/Picture1.png&quot; width=&quot;296&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;The Australian Signals Directorate has issued a warning about an increased risk of phishing scams following yesterday&#39;s CrowdStrike outage.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;According to the alert, ASD’s ACSC has identified numerous malicious websites and unofficial code claiming to assist entities in recovering from the widespread outages caused by the CrowdStrike technical incident.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;ASD’s &lt;b&gt;ACSC&lt;/b&gt; strongly advises all consumers to obtain their technical information and updates directly from official CrowdStrike sources only. [Learn more here]&lt;a href=&quot;https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/widespread-outages-relating-crowdstrike-software-update?fbclid=IwZXh0bgNhZW0CMTEAAR1veIrKLYJrloZIx7AvqS6Nlqv3UfvENiPg6lVbHUhffjbS_7HBzNQEGdI_aem_TUaGcC36MEN9SJxw0OUTnQ&quot;&gt;https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/widespread-outages-relating-crowdstrike-software-update?fbclid=IwZXh0bgNhZW0CMTEAAR1veIrKLYJrloZIx7AvqS6Nlqv3UfvENiPg6lVbHUhffjbS_7HBzNQEGdI_aem_TUaGcC36MEN9SJxw0OUTnQ&lt;/a&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot;&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;It appears that threat actors are exploiting the &lt;b&gt;#CrowdStrike&lt;/b&gt; situation through &lt;b&gt;#phishing&lt;/b&gt; and &lt;b&gt;#spoofing&lt;/b&gt; campaigns.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Here is a list of newly created domains&amp;nbsp;https://urlscan.io/search/#crowdstrike*&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Before clicking on any links, use tools like Domain Dossier, &lt;a href=&quot;http://URLscan.io&quot;&gt;URLscan.io&lt;/a&gt;, and VirusTotal to check their authenticity — because threat actors never miss an opportunity to exploit a disaster.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;&lt;b&gt;#threatactors&lt;/b&gt; &lt;b&gt;#hackers&lt;/b&gt; &lt;b&gt;#CrowdStrike&lt;/b&gt; &lt;b&gt;#phishing&lt;/b&gt; &lt;b&gt;#urlscan&lt;/b&gt; &lt;b&gt;#cybertip&lt;/b&gt; &lt;b&gt;#VirusTotal&lt;/b&gt; &lt;b&gt;#ASD&lt;/b&gt; &lt;b&gt;#ACSC&lt;/b&gt; &lt;b&gt;#AISA&lt;/b&gt; &lt;b&gt;#Australia&lt;/b&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.maximusit.net/feeds/7875669715520202017/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.maximusit.net/2024/07/increased-risk-of-phishing-scams.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/7875669715520202017'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/7875669715520202017'/><link rel='alternate' type='text/html' href='http://www.maximusit.net/2024/07/increased-risk-of-phishing-scams.html' title='Increased risk of phishing scams following CrowdStrike outage'/><author><name>Faysal Hasan</name><uri>http://www.blogger.com/profile/11837891241239740342</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg114jiXc16Jma6UOvHnQVzD9_wEmkN_xsRAGS_EJhZbcvTvX4DIjen5b6wNAGiMFJnm2LHdK_1qlOD90FDX4gc42Pgcl1G86GpaIgEfInCD8Tj5Mj73_9gGaGRjOUzuujerAUAxgis2FYYEaK0YTc-WbI9_BYDrRtw65j7RySlKuSrnGybVzZUVhhgIKn4/s72-c/Picture1.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8774245130267339525.post-3721313733691239819</id><published>2024-07-20T06:40:00.006+10:00</published><updated>2024-07-20T06:51:54.154+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cyber"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><title type='text'>Crowdstrike Global IT outage affecting computers around the world</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot;&gt;A current worldwide &lt;a href=&quot;&quot;&gt;#CrowdStrike&lt;/a&gt; issue causing &lt;a href=&quot;&quot;&gt;#BSOD&lt;/a&gt;. Seen reports from&amp;nbsp; AU, NZ ,Japan, India. And Europe.&amp;nbsp;The global computer outage affecting airports, banks and other businesses.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVa2BE5EaDBIP4J0kioL-eCUs7upXfWQmzSLYMWkJa_CnmFEHIRwnG2Z6c386TYmKbNTnky8yOwvY7GIOQX9gYOSuQhRhx-JraTdtzKe4DSStnxkB5DJYglk384mDZsA6A553on_4PxGBLlNpmhof1YtXuq_giXSqqqkR7GCIEGPCyTfcMb0HzacEOvR6-/s739/crowdstrike%20BSOD.jpeg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;415&quot; data-original-width=&quot;739&quot; height=&quot;180&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVa2BE5EaDBIP4J0kioL-eCUs7upXfWQmzSLYMWkJa_CnmFEHIRwnG2Z6c386TYmKbNTnky8yOwvY7GIOQX9gYOSuQhRhx-JraTdtzKe4DSStnxkB5DJYglk384mDZsA6A553on_4PxGBLlNpmhof1YtXuq_giXSqqqkR7GCIEGPCyTfcMb0HzacEOvR6-/s320/crowdstrike%20BSOD.jpeg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p dir=&quot;ltr&quot;&gt;CrowdStrike’s cybersecurity software — used by numerous Fortune 500 companies, including major global banks, healthcare and energy companies — detects and blocks hacking threats. Like other cybersecurity products, the software requires deep-level access to a computer’s operating system to scan for those threats. In this case, computers running Microsoft Windows appear to be crashing because of the faulty way a software code update issued by CrowdStrike is interacting with the Windows system.&lt;/p&gt;&lt;p dir=&quot;ltr&quot;&gt;This issue is not impacting Mac- or Linux-based hosts&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Some servers on perm and cloud and devices are not resuming correctly and are getting stuck in boot loops that have &lt;a href=&quot;&quot;&gt;#Crowdstrike&lt;/a&gt;.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Some seen successful reboots which work for about 15 mins and then they stop and then go back into a boot loop.&lt;br /&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnd4pWjdnfCnU5GzmSwMwpH2fibO6DiW03TGmRVSgQNhuqERGEXAzWybE2v3Psg65rzkux_p8CZPxJgHWDmt4uVqqeJ-onBVqmmqOeKdlLLX2XiJA_B1D8s0B0JSr_98laKgppLZa90bxdr-rgM6BjonmrBZ90VRDuTZb7FQh35ZB_4DlQNFuNb8sFqzXT/s897/1721420953426.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;512&quot; data-original-width=&quot;897&quot; height=&quot;183&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnd4pWjdnfCnU5GzmSwMwpH2fibO6DiW03TGmRVSgQNhuqERGEXAzWybE2v3Psg65rzkux_p8CZPxJgHWDmt4uVqqeJ-onBVqmmqOeKdlLLX2XiJA_B1D8s0B0JSr_98laKgppLZa90bxdr-rgM6BjonmrBZ90VRDuTZb7FQh35ZB_4DlQNFuNb8sFqzXT/s320/1721420953426.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p dir=&quot;ltr&quot;&gt;Technical Breakdown&lt;/p&gt;&lt;p dir=&quot;ltr&quot;&gt;1. Crowdstrike publishes a content update for their threat feed, which is basically a list of patterns of “bad things”&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot;&gt;2. Software agents get this update and apply the controls to block things that match this pattern&amp;nbsp;&lt;/p&gt;&lt;p dir=&quot;ltr&quot;&gt;3. The update has a pattern which matches a critical Windows process but the software blocks it anyway&lt;/p&gt;&lt;p dir=&quot;ltr&quot;&gt;4. Windows crashes with a Blue Screen of Death (BSOD) and reboots&amp;nbsp;&lt;/p&gt;&lt;p dir=&quot;ltr&quot;&gt;5. On reboot, CrowdStrike kills the process again and Windows reboots&lt;/p&gt;&lt;p dir=&quot;ltr&quot;&gt;6. And it’s now a loop… There are various ways of fixing this but for most systems it will involve physically visiting every affected system, booting into “safe mode” and fixing the problem manually.&amp;nbsp;&lt;/p&gt;&lt;p dir=&quot;ltr&quot;&gt;For some cloud systems though, such as AWS, “safe mode” is not even possible so this fix doesn’t work. The virtual servers will need to be shut down, their disks cloned, attached to another server, edited to remove the offending files and then finally reattach to the original server.&lt;/p&gt;&lt;p dir=&quot;ltr&quot;&gt;BUT, if you’re protecting your data and using encryption at rest, you need to manually decrypt the disk with a BitLocker Recovery Key, which is probably - for most companies&lt;/p&gt;&lt;p dir=&quot;ltr&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot;&gt;Updated workaround steps:&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Boot Windows into Safe Mode or the Windows Recovery Environment&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Navigate to the C:\Windows\System32\drivers\CrowdStrike directory&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Locate the file matching “C-00000291*.sys”, and delete it. &lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt; &lt;br /&gt;
Boot the host normally.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Crowdstrike published a post with updated details for quering machine and how to fix here &lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;&lt;a href=&quot;https://www.crowdstrike.com/blog/statement-on-falcon-content-update-for-windows-hosts/&quot;&gt;https://www.crowdstrike.com/blog/statement-on-falcon-content-update-for-windows-hosts/&lt;/a&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLsMCtbtw-vAhn10E8_wvu8b1ugyZxazmrIEHBWcU_-XICfGDj4j4DtkEja09RXQLj59bGazhTq61E-FkefffPGmlWFtqZzyMb5dtvuW_lmrAU2s4Vm6xihYg_vgh4IhPVf3JZ56sw3xarPTLPEUdPG_dE1t-F1_JUagNMXRP1D2YxKVwmFmXDSXk8Re1Y/s516/20240719_170525.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;516&quot; data-original-width=&quot;500&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLsMCtbtw-vAhn10E8_wvu8b1ugyZxazmrIEHBWcU_-XICfGDj4j4DtkEja09RXQLj59bGazhTq61E-FkefffPGmlWFtqZzyMb5dtvuW_lmrAU2s4Vm6xihYg_vgh4IhPVf3JZ56sw3xarPTLPEUdPG_dE1t-F1_JUagNMXRP1D2YxKVwmFmXDSXk8Re1Y/s320/20240719_170525.jpg&quot; width=&quot;310&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p dir=&quot;ltr&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div&gt;This is really just a good reminder of how MANY systems are dependent on IT.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Technology is engrained in every part of our lives. We don’t notice it when it’s working well. We only notice when something goes wrong. No one talks about how many millions of attacks were stopped, or upgrades that went smoothly. Everyone remembers the ones that didn&#39;t.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;
&lt;p dir=&quot;ltr&quot;&gt;&lt;a href=&quot;&quot;&gt;#Crowdstrike&lt;/a&gt; &lt;a href=&quot;&quot;&gt;#update&lt;/a&gt; &lt;a href=&quot;&quot;&gt;#BSOD&lt;/a&gt; &lt;a href=&quot;&quot;&gt;#EDR&lt;/a&gt; &lt;a href=&quot;&quot;&gt;#outage&lt;/a&gt; &lt;a href=&quot;&quot;&gt;#ITissue&lt;/a&gt;&lt;/p&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.maximusit.net/feeds/3721313733691239819/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.maximusit.net/2024/07/crowdstrike-global-it-outage-affecting.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/3721313733691239819'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/3721313733691239819'/><link rel='alternate' type='text/html' href='http://www.maximusit.net/2024/07/crowdstrike-global-it-outage-affecting.html' title='Crowdstrike Global IT outage affecting computers around the world'/><author><name>Faysal Hasan</name><uri>http://www.blogger.com/profile/11837891241239740342</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVa2BE5EaDBIP4J0kioL-eCUs7upXfWQmzSLYMWkJa_CnmFEHIRwnG2Z6c386TYmKbNTnky8yOwvY7GIOQX9gYOSuQhRhx-JraTdtzKe4DSStnxkB5DJYglk384mDZsA6A553on_4PxGBLlNpmhof1YtXuq_giXSqqqkR7GCIEGPCyTfcMb0HzacEOvR6-/s72-c/crowdstrike%20BSOD.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8774245130267339525.post-3517899861476384073</id><published>2024-04-15T22:58:00.002+10:00</published><updated>2024-04-15T23:10:34.130+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Bangladesh"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="IT Exam"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Free cyber security course. Delve into essential cybersecurity NIST Risk management frameworks  </title><content type='html'>&lt;p&gt;&amp;nbsp;🌟 Exciting Announcement Alert! Last week, NIST took a significant step in advancing cybersecurity education by releasing four introductory courses covering their flagship publications for FREE! 🆓&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkKc9nbBMLGOMUjKNIOKUL7-QJO-zL78F4ULNISMDQrRnGua2uaDHd4gfyT_qbbKpXl8d1-AdZGJJ0M1PE2EchK3kBk8LgyrrxO340v5VTLETpUXLrBeud7v1tJfZDmsZzHa-zJeCFpK6Yeh69ztiq2k0Z5FxImE8BbWsCsuWHfHdHwX-d3cME7r_HK4pB/s756/NIST%20RMF%20Graphc-Prepare%20Step.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;756&quot; data-original-width=&quot;756&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkKc9nbBMLGOMUjKNIOKUL7-QJO-zL78F4ULNISMDQrRnGua2uaDHd4gfyT_qbbKpXl8d1-AdZGJJ0M1PE2EchK3kBk8LgyrrxO340v5VTLETpUXLrBeud7v1tJfZDmsZzHa-zJeCFpK6Yeh69ztiq2k0Z5FxImE8BbWsCsuWHfHdHwX-d3cME7r_HK4pB/s320/NIST%20RMF%20Graphc-Prepare%20Step.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;📘 Delve into essential cybersecurity frameworks with courses on:&lt;/p&gt;&lt;p&gt;- NIST SP 800-37, Risk Management Framework (RMF)&amp;nbsp;&lt;/p&gt;&lt;p&gt;- NIST SP 800-53, Security and Privacy Controls for Information Systems and Organizations&lt;/p&gt;&lt;p&gt;-&amp;nbsp;NIST SP 800-53A, Assessing Security and Privacy Controls in Information Systems and Organizations&lt;/p&gt;&lt;p&gt;-&amp;nbsp;NIST SP 800-53B, Control Baselines for Information Systems and Organizations&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;🔍 These meticulously curated courses offer unparalleled insights into cybersecurity best practices, delivered in a concise format designed to optimize learning efficiency. With just 60 minutes required for each course, professionals can easily incorporate this valuable knowledge into their busy schedules.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;But the excitement doesn&#39;t stop there! NIST has also unveiled a comprehensive crosswalk between NIST CSF 2.0 and NIST SP 800-53, providing invaluable guidance for cybersecurity practitioners navigating these frameworks.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Some common question and answer regarding the course&lt;/p&gt;&lt;p&gt;&lt;b&gt;Q: Are these courses self-guided or instructor-led?&lt;/b&gt;&lt;/p&gt;&lt;p&gt;A: The courses provided are self-guided online courses.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Q: Is there a fee to access these courses?&lt;/b&gt;&lt;/p&gt;&lt;p&gt;A: No. The NIST materials provided on the CSRC website, including the RMF and SP 800-53 series introductory courses, are free to any interested party.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Q: Is registration required?&lt;/b&gt;&lt;/p&gt;&lt;p&gt;A: No. Registration is not required to access the courses.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Q: Is there a quiz at the end of each course?&lt;/b&gt;&lt;/p&gt;&lt;p&gt;A: No, there are no quizzes at the end of each course. The material in each course is provided for informational purposes only.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Q: Are certificates issued upon completion of the courses?&lt;/b&gt;&lt;/p&gt;&lt;p&gt;A: At the end of each course presented on this NIST website, a certificate of course completion is provided as a courtesy. The certificate only identifies that the course material was viewed and does not attest to any qualifications, knowledge, or skill level resulting from the completion of the course.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Q: How do I print the certificate of completion?&lt;/b&gt;&lt;/p&gt;&lt;p&gt;A: Use the browser&#39;s print option, generally found in the browser menu, to print or capture a PDF of the course certificate. Please add your name and the date of completion to the certificate.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;🔗 Dive into these invaluable resources today! Links to the crosswalk and courses can be found in here &lt;a href=&quot;https://csrc.nist.gov/Projects/risk-management/rmf-courses&quot;&gt;https://csrc.nist.gov/Projects/risk-management/rmf-courses&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;.Let&#39;s elevate our cybersecurity expertise together!&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&amp;nbsp;💼 #NIST #Cybersecurity #ProfessionalDevelopment #KnowledgeIsPower&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.maximusit.net/feeds/3517899861476384073/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.maximusit.net/2024/04/free-cyber-security-course-delve-into.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/3517899861476384073'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/3517899861476384073'/><link rel='alternate' type='text/html' href='http://www.maximusit.net/2024/04/free-cyber-security-course-delve-into.html' title='Free cyber security course. Delve into essential cybersecurity NIST Risk management frameworks  '/><author><name>Faysal Hasan</name><uri>http://www.blogger.com/profile/11837891241239740342</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkKc9nbBMLGOMUjKNIOKUL7-QJO-zL78F4ULNISMDQrRnGua2uaDHd4gfyT_qbbKpXl8d1-AdZGJJ0M1PE2EchK3kBk8LgyrrxO340v5VTLETpUXLrBeud7v1tJfZDmsZzHa-zJeCFpK6Yeh69ztiq2k0Z5FxImE8BbWsCsuWHfHdHwX-d3cME7r_HK4pB/s72-c/NIST%20RMF%20Graphc-Prepare%20Step.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8774245130267339525.post-7149577674907947175</id><published>2024-03-31T18:14:00.006+11:00</published><updated>2024-03-31T18:30:12.930+11:00</updated><title type='text'>Securing Your Future: The Bright Outlook for Careers in Cybersecurity</title><content type='html'>&lt;p&gt;The Bright Future of Careers in Cybersecurity.&amp;nbsp;Explore the thriving job market, competitive salaries, and abundant growth opportunities in cybersecurity careers. Discover why a career in cybersecurity offers both financial rewards and the satisfaction of protecting our digital world&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgtkHF0y_fGCbzt5SdURG-2u6jz8TSSQnKGJOlx7VQPZVduf7ym5VvAlokn1SGxjw6T7cKeM6dt9VQIirBWhpS8AWendLanMAUZr3E8XO9lgrK7wLochH-DZfy68xZQrRAzMW27YMzyZ7f1X6NvZzGmOdNlOVEtfE4Pjh7NxrwTc6ZvwHSuLGgetMMnA23/s338/cyber%20career.jpeg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;338&quot; data-original-width=&quot;338&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgtkHF0y_fGCbzt5SdURG-2u6jz8TSSQnKGJOlx7VQPZVduf7ym5VvAlokn1SGxjw6T7cKeM6dt9VQIirBWhpS8AWendLanMAUZr3E8XO9lgrK7wLochH-DZfy68xZQrRAzMW27YMzyZ7f1X6NvZzGmOdNlOVEtfE4Pjh7NxrwTc6ZvwHSuLGgetMMnA23/s320/cyber%20career.jpeg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;The landscape of cybersecurity careers is experiencing a significant uptrend, fueled by several driving forces:&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Rising Cyber Threats:&lt;/p&gt;&lt;p&gt;The frequency, complexity, and cost of cyberattacks are on the rise. This escalating threat landscape is prompting organizations across all sectors to prioritize investments in robust cybersecurity measures.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Advancing Technologies:&lt;/p&gt;&lt;p&gt;The widespread adoption of cloud computing, mobile devices, and the Internet of Things (IoT) is expanding the attack surface for cyber threats. As a result, there is a growing need for skilled professionals to secure these evolving technologies.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Increased Awareness:&lt;/p&gt;&lt;p&gt;With cyberattacks making headlines, both businesses and individuals are increasingly recognizing the critical importance of cybersecurity. This heightened awareness is translating into a greater demand for qualified cybersecurity professionals across industries.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Here are four promising trends to consider when contemplating a career in cybersecurity:&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;1. Favorable Job Market:&lt;/p&gt;&lt;p&gt;According to recent projections from reputable sources, the global cybersecurity workforce is projected to face a shortage of millions of professionals by 2024. This significant talent gap indicates a thriving job market for individuals with the requisite skills and expertise.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;2. Competitive Compensation:&lt;/p&gt;&lt;p&gt;Given the high demand for cybersecurity skills, professionals in this field can anticipate competitive salaries. Many positions offer lucrative earning potential, reflecting the value placed on cybersecurity expertise by organizations worldwide.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;3. Abundant Growth Opportunities:&lt;/p&gt;&lt;p&gt;The cybersecurity landscape is dynamic and ever-evolving, presenting numerous avenues for career advancement and skill development. Professionals can specialize in various domains, pursue leadership roles, or explore adjacent fields such as cybercrime investigation.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;4. Fulfilling Career Trajectory:&lt;/p&gt;&lt;p&gt;Beyond financial incentives, a career in cybersecurity offers the gratification of safeguarding sensitive information and critical infrastructure. It is a profession where individuals can actively contribute to protecting the digital realm and making a tangible difference in securing our interconnected world.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;In conclusion, the outlook for cybersecurity careers is exceptionally promising, with abundant opportunities for growth, competitive compensation, and the chance to make a meaningful impact. For those considering a career in cybersecurity, the future is indeed bright and brimming with potential.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.maximusit.net/feeds/7149577674907947175/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.maximusit.net/2024/03/securing-your-future-bright-outlook-for.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/7149577674907947175'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/7149577674907947175'/><link rel='alternate' type='text/html' href='http://www.maximusit.net/2024/03/securing-your-future-bright-outlook-for.html' title='Securing Your Future: The Bright Outlook for Careers in Cybersecurity'/><author><name>Faysal Hasan</name><uri>http://www.blogger.com/profile/11837891241239740342</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgtkHF0y_fGCbzt5SdURG-2u6jz8TSSQnKGJOlx7VQPZVduf7ym5VvAlokn1SGxjw6T7cKeM6dt9VQIirBWhpS8AWendLanMAUZr3E8XO9lgrK7wLochH-DZfy68xZQrRAzMW27YMzyZ7f1X6NvZzGmOdNlOVEtfE4Pjh7NxrwTc6ZvwHSuLGgetMMnA23/s72-c/cyber%20career.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8774245130267339525.post-148206296330542742</id><published>2024-03-31T18:02:00.008+11:00</published><updated>2024-03-31T18:27:44.569+11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cyber"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Job Interview and Ideas"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Teamwork"/><title type='text'>Navigating the Path to a Cybersecurity Career in Australia or anywhere : Roles, Opportunities, and Guidance</title><content type='html'>&lt;p&gt;Embarking on a career in cybersecurity is an exciting journey filled with opportunities for growth and learning. With the ever-evolving digital landscape, the demand for skilled cybersecurity professionals continues to rise, making it an ideal time to explore this dynamic field.&amp;nbsp;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSc-2QN_ZnL5CeYd4TDw09LhfqRd9x1psDmNAeLT-eKD_nmbMNSaRwMKnSsmYhDs8h6stPu9hInjdbbQX9W5pucIGndlF4IUXOiArpAPe5DWFOs_Lcc6sMZzcAswGmQCibiP4bDMLOtlb9n0epXEvpBE5LCZsiaitaRH5Lci-jnksBu4sU5n0dNlNiSLI9/s783/cyber%20professional.jpeg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;391&quot; data-original-width=&quot;783&quot; height=&quot;160&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSc-2QN_ZnL5CeYd4TDw09LhfqRd9x1psDmNAeLT-eKD_nmbMNSaRwMKnSsmYhDs8h6stPu9hInjdbbQX9W5pucIGndlF4IUXOiArpAPe5DWFOs_Lcc6sMZzcAswGmQCibiP4bDMLOtlb9n0epXEvpBE5LCZsiaitaRH5Lci-jnksBu4sU5n0dNlNiSLI9/s320/cyber%20professional.jpeg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;p&gt;In this post, we will delve into the various roles available in cybersecurity, including specialized positions, and provide guidance on how to pursue them effectively in the Australian market&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;u&gt;1. Blue Team Roles&lt;/u&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;&lt;b&gt;Security Analyst&lt;/b&gt;: Responsible for monitoring and analyzing security events, investigating incidents, and implementing defensive measures to protect an organization&#39;s systems and data.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;&lt;b&gt;Security Operations Center (SOC) Analyst:&lt;/b&gt; Works in a SOC environment, monitoring security alerts, triaging incidents, and responding to threats in real-time.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;&lt;b&gt;Incident Responder&lt;/b&gt;: Focuses on incident detection, containment, and recovery, coordinating response efforts during security breaches or incidents.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;b&gt;&lt;i&gt;Getting Started&lt;/i&gt;&lt;/b&gt;: Entry-level positions often require foundational knowledge of cybersecurity principles and tools. Pursue certifications like CompTIA Security+ and gain experience through internships, entry-level roles, or hands-on projects.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;u&gt;2. Red Team Roles:&lt;/u&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;&lt;b&gt;Penetration Tester (Pen Tester): &lt;/b&gt;Conducts authorized simulated attacks on systems and networks to identify vulnerabilities and assess security posture.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;&lt;b&gt;Ethical Hacker:&lt;/b&gt; Utilizes hacking techniques and methodologies to identify and address security weaknesses in systems and applications.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;&lt;b&gt;Security Consultant: &lt;/b&gt;Provides expertise in assessing and improving security controls, conducting security assessments, and recommending remediation measures.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;&lt;b&gt;&lt;i&gt;Getting Started:&lt;/i&gt;&lt;/b&gt; Develop technical skills in penetration testing, network security, and ethical hacking through hands-on labs, capture-the-flag (CTF) competitions, and certifications like Certified Ethical Hacker (CEH) or Offensive Security Certified Professional (OSCP).&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;u&gt;3. Compliance and Governance Roles:&lt;/u&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;&lt;b&gt;Governance, Risk, and Compliance (GRC) Analyst&lt;/b&gt;: Ensures adherence to regulatory requirements, industry standards, and internal policies, conducting risk assessments and developing compliance strategies.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;&lt;b&gt;Security Auditor&lt;/b&gt;: Conducts audits of systems, processes, and controls to assess compliance with regulatory frameworks and industry standards.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;&lt;b&gt;&lt;i&gt;Getting Started&lt;/i&gt;&lt;/b&gt;: Gain knowledge of relevant regulations and standards such as GDPR, HIPAA, ISO 27001, and NIST Cybersecurity Framework. Pursue certifications like Certified Information Systems Auditor (CISA) or Certified Information Security Manager (CISM).&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;u&gt;4. Specialized Roles:&lt;/u&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;&lt;b&gt;Cloud Security Specialist&lt;/b&gt;: Focuses on securing cloud environments, ensuring the confidentiality, integrity, and availability of cloud-based assets and services.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;&lt;b&gt;IoT Security Specialist: &lt;/b&gt;Addresses security challenges associated with Internet of Things (IoT) devices, networks, and ecosystems, ensuring the protection of connected devices and data.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;&lt;b&gt;Industrial Control Systems (ICS) Security Analyst&lt;/b&gt;: Secures operational technology (OT) environments, including supervisory control and data acquisition (SCADA) systems and industrial control systems, against cyber threats.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;&lt;b&gt;&lt;i&gt;Getting Started&lt;/i&gt;&lt;/b&gt;: Gain specialized knowledge and skills through training programs, certifications, and hands-on experience in specific domains such as cloud security, IoT security, or industrial cybersecurity.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;To pursue these roles, it&#39;s essential to continuously expand your knowledge, develop practical skills, and stay updated on emerging technologies and threats. Engage in professional development activities, participate in relevant communities and forums, and leverage networking opportunities to connect with industry professionals and explore career paths in cybersecurity. Additionally, consider pursuing advanced certifications and higher education programs to deepen your expertise and advance your career in the field&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;u&gt;&lt;i&gt;&lt;b&gt;Getting Started in Cybersecurity: Your Roadmap to Success&lt;/b&gt;&lt;/i&gt;&lt;/u&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Embarking on a career in cybersecurity can seem daunting, especially for newcomers to the field. However, with the right approach and resources, anyone can start their journey towards becoming a skilled cybersecurity professional.&lt;/p&gt;&lt;p&gt;Here&#39;s a comprehensive roadmap to help you get started:&lt;/p&gt;&lt;p&gt;&lt;b&gt;1. Gain Foundational Knowledge: &lt;/b&gt;Begin by building a strong foundation in cybersecurity principles, concepts, and technologies. Consider enrolling in formal education programs such as cybersecurity-related courses, diplomas, or degree programs offered by universities or technical colleges. These programs cover essential topics such as network security, cryptography, risk management, and ethical hacking, providing you with a solid understanding of the fundamentals.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;2. &lt;b&gt;Explore Different Areas of Cybersecurity&lt;/b&gt;: Cybersecurity is a broad field with various specializations and career paths. Take the time to explore different areas of cybersecurity to discover where your interests and strengths lie.&lt;/p&gt;&lt;p&gt;The spectrum of skills required in Cyber is larger than that of most professions.&lt;/p&gt;&lt;p&gt;We need people who understand:&lt;/p&gt;&lt;p&gt;➡️ People Management&lt;/p&gt;&lt;p&gt;➡️ Security Compliance and Regulations&lt;/p&gt;&lt;p&gt;➡️ Governance and Risk Management&lt;/p&gt;&lt;p&gt;➡️ Legal and Ethical Considerations&lt;/p&gt;&lt;p&gt;➡️ Security Awareness, Training and Psychology&lt;/p&gt;&lt;p&gt;➡️ Engineering&lt;/p&gt;&lt;p&gt;➡️ Architecture&lt;/p&gt;&lt;p&gt;➡️ Endpoints &amp;amp; Networks&lt;/p&gt;&lt;p&gt;➡️ Secure DevOps (DevSecOps)&lt;/p&gt;&lt;p&gt;➡️ Threat Intelligence&lt;/p&gt;&lt;p&gt;➡️ Detection &amp;amp; Investigation&lt;/p&gt;&lt;p&gt;➡️ Incident Response&lt;/p&gt;&lt;p&gt;➡️ Security Research and Innovation&lt;/p&gt;&lt;p&gt;➡️ and more…&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Truth is, effective Cyber Security is a team sport. One where a diverse group of people are working together, communicating and playing to our strengths.&lt;/p&gt;&lt;p&gt;Research roles such as security analyst, penetration tester, security consultant, or compliance officer to understand their responsibilities, required skills, and career prospects. Engage with online communities, forums, and professional networking platforms to connect with experienced professionals and learn from their experiences.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;3. Pursue Certifications and Training:&lt;/b&gt;&amp;nbsp;Certifications play a crucial role in validating your knowledge and skills in cybersecurity and are highly valued by employers. Consider obtaining industry-recognized certifications such as CompTIA Security+, Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or Certified Information Security Manager (CISM). These certifications demonstrate your expertise and commitment to the field, increasing your chances of landing a job in cybersecurity. Additionally, leverage online training platforms and resources such as Cybrary, Coursera, or Udemy to further enhance your skills and knowledge in specific areas of cybersecurity.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;4. Gain Practical Experience: &lt;/b&gt;Hands-on experience is invaluable in cybersecurity and can significantly enhance your employability. Look for opportunities to gain practical experience through internships, co-op programs, or entry-level positions in cybersecurity-related roles. Many organizations offer internship programs specifically for cybersecurity students or recent graduates, providing valuable exposure to real-world cybersecurity challenges and environments. Additionally, consider participating in capture-the-flag (CTF) competitions, hackathons, or open-source projects to hone your technical skills and problem-solving abilities.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;5. &lt;b&gt;Network and Engage with the Cybersecurity Community:&lt;/b&gt; Networking is key to success in cybersecurity. Connect with professionals in the field, join online communities and forums, and attend industry events, conferences, and meetups to expand your network and learn from others.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Join professional organizations like the Australian Information Security Association (AISA) or the Australian Computer Society (ACS) to connect with industry professionals and stay updated on the latest trends and developments. Attend events such as BSides, which offer networking opportunities and valuable insights into the cybersecurity community.&lt;/p&gt;&lt;p&gt;Engage with cybersecurity professionals on platforms like LinkedIn, Twitter, or Reddit, participate in discussions, ask questions, and seek mentorship opportunities. Building relationships with experienced professionals can provide valuable insights, guidance, and career opportunities in cybersecurity.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;6. Continuously Learn and Stay Updated:&lt;/b&gt; Cybersecurity is a constantly evolving field, with new threats, technologies, and best practices emerging regularly. Stay updated on the latest trends, developments, and news in cybersecurity by following industry blogs, podcasts, and news sources. Subscribe to cybersecurity newsletters, join relevant online forums and communities, and participate in webinars, workshops, and training sessions to stay informed and expand your knowledge. Additionally, consider pursuing advanced certifications, attending conferences, or pursuing higher education programs to further develop your expertise and advance your career in cybersecurity.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;By following this roadmap and taking proactive steps to build your skills, gain experience, and network with professionals in the field, you can kickstart your career in cybersecurity and embark on a rewarding and fulfilling journey in this dynamic and high-demand field.&lt;/p&gt;&lt;p&gt;Navigating a cybersecurity career in Australia requires dedication, continuous learning, and perseverance. By exploring different roles, gaining practical experience, and staying updated on industry trends, you can embark on a rewarding career path in cybersecurity and contribute to the protection of organizations against evolving digital threats.&lt;/p&gt;&lt;p&gt;For more guidance and resources on pursuing a cybersecurity career in Australia, stay connected with MaximisIT.net, your trusted partner in cybersecurity.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.maximusit.net/feeds/148206296330542742/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.maximusit.net/2024/03/navigating-path-to-cybersecurity-career.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/148206296330542742'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/148206296330542742'/><link rel='alternate' type='text/html' href='http://www.maximusit.net/2024/03/navigating-path-to-cybersecurity-career.html' title='Navigating the Path to a Cybersecurity Career in Australia or anywhere : Roles, Opportunities, and Guidance'/><author><name>Faysal Hasan</name><uri>http://www.blogger.com/profile/11837891241239740342</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSc-2QN_ZnL5CeYd4TDw09LhfqRd9x1psDmNAeLT-eKD_nmbMNSaRwMKnSsmYhDs8h6stPu9hInjdbbQX9W5pucIGndlF4IUXOiArpAPe5DWFOs_Lcc6sMZzcAswGmQCibiP4bDMLOtlb9n0epXEvpBE5LCZsiaitaRH5Lci-jnksBu4sU5n0dNlNiSLI9/s72-c/cyber%20professional.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8774245130267339525.post-1639046057137623042</id><published>2023-10-08T14:32:00.002+11:00</published><updated>2023-10-08T14:32:25.651+11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cyber"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>MGM Cyber Attack cost 110 Million</title><content type='html'>&lt;p&gt;In September the hospitality and entertainment company &lt;b&gt;#MGM&lt;/b&gt; Resorts was hit by a &lt;b&gt;#ransomware&lt;/b&gt; attack that shut down its systems at MGM Hotels and Casinos.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;The incident affected &lt;b&gt;#hotel&lt;/b&gt; reservation systems in the United States and other IT systems that run the casino floors.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;The company now revealed that the costs from the &lt;b&gt;#ransomware&lt;/b&gt; attack have exceeded $110 million. The company paid third-party experts $10 million to clean up its systems.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Allegedly, a criminal gang made up of U.S. and U.K.-based individuals that cybersecurity experts call &lt;b&gt;#Scattered&lt;/b&gt; Spider (aka Roasted 0ktapus, UNC3944 or Storm-0875) initiated a social engineering attack that led to the near shutdown of &lt;b&gt;#MGM&lt;/b&gt; Resorts International.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Scattered Spider &lt;b&gt;#encrypted&lt;/b&gt; several hundred of their &lt;b&gt;#ESXi&lt;/b&gt; servers, which hosted thousands of VMs supporting hundreds of systems widely used in the hospitality industry. This caused cascading chaos. As the &lt;b&gt;#ESXi&lt;/b&gt; hosts became encrypted one after another, the applications running on them crashed … one after another … after another. Hotel room keys no longer worked. Dinner reservation systems were down. Point-of-sale systems were unable to take payments. Guests were unable to check in or out. Slot machines were completely unavailable. At this point, MGM was hemorrhaging money – and potentially its credibility.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;A nice deep technical Analysis by cyber &lt;b&gt;#security&lt;/b&gt; company &lt;b&gt;#CyberArk&lt;/b&gt; whic details the &lt;b&gt;#attack&lt;/b&gt; based on the information currently available, analyze its root causes and discuss key takeaways to help organizations strengthen their security posture.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;&lt;b&gt;#cyber&lt;/b&gt; &lt;b&gt;#databreach&lt;/b&gt; &lt;b&gt;#socialengineering&lt;/b&gt; &lt;b&gt;#ransomware&lt;/b&gt; &lt;b&gt;#okta&lt;/b&gt; &lt;b&gt;#security&lt;/b&gt;&amp;nbsp; &lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;https://www.cyberark.com/resources/blog/the-mgm-resorts-attack-initial-anaysis&lt;/p&gt;&lt;p dir=&quot;ltr&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSgW9O7OaBSSjqqUzb91cxkkLI9DW-s2uvnHlZY-HPve_bzG_Am7WmFhCrwQArJN_0j2v5GLC1n-ySJfjRXTAvRyPUMBEw8gLNBXCkCmd1JsvSjshvn4yUcc2YklGNySjVIE0qzLsAcsCtTBOewsgep_hT_uzO0vzQj8u_uEf3uP8TmwfkSt9Jdnu4UoUg/s1024/mgm-cyberattack-1024x576.webp&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;576&quot; data-original-width=&quot;1024&quot; height=&quot;180&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSgW9O7OaBSSjqqUzb91cxkkLI9DW-s2uvnHlZY-HPve_bzG_Am7WmFhCrwQArJN_0j2v5GLC1n-ySJfjRXTAvRyPUMBEw8gLNBXCkCmd1JsvSjshvn4yUcc2YklGNySjVIE0qzLsAcsCtTBOewsgep_hT_uzO0vzQj8u_uEf3uP8TmwfkSt9Jdnu4UoUg/s320/mgm-cyberattack-1024x576.webp&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p dir=&quot;ltr&quot;&gt;&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.maximusit.net/feeds/1639046057137623042/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.maximusit.net/2023/10/mgm-cyber-attack-cost-110-million.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/1639046057137623042'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/1639046057137623042'/><link rel='alternate' type='text/html' href='http://www.maximusit.net/2023/10/mgm-cyber-attack-cost-110-million.html' title='MGM Cyber Attack cost 110 Million'/><author><name>Faysal Hasan</name><uri>http://www.blogger.com/profile/11837891241239740342</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSgW9O7OaBSSjqqUzb91cxkkLI9DW-s2uvnHlZY-HPve_bzG_Am7WmFhCrwQArJN_0j2v5GLC1n-ySJfjRXTAvRyPUMBEw8gLNBXCkCmd1JsvSjshvn4yUcc2YklGNySjVIE0qzLsAcsCtTBOewsgep_hT_uzO0vzQj8u_uEf3uP8TmwfkSt9Jdnu4UoUg/s72-c/mgm-cyberattack-1024x576.webp" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8774245130267339525.post-4098457416458642314</id><published>2023-06-04T14:00:00.010+10:00</published><updated>2023-06-06T04:19:55.841+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cyber"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Programming"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Teamwork"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><title type='text'>Developing and implementing security controls for Azure Active Directory (Azure AD)</title><content type='html'>&lt;p&gt;Today we will share the list of things you need to consider for Developing and implementing security controls for Azure Active Directory (Azure AD):&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrQEqUTKfxgH5HsZP5wx4fjLNTCMmANb5tbafYE2IyJ6cVK6Y--pCFufss1wuDREhN1wZSov9-2D74JWPDhKxQNjuwwbswHDhMyv_jPDGasqQmgaipOZCMYdWQlghTcE_WahPsFpyUnKXY5MJeaEcE1OBEqIfvh74BJB5w9jiFXo2AT6HMRx8NiuTEFg/s582/Azure%20AD.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;527&quot; data-original-width=&quot;582&quot; height=&quot;290&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrQEqUTKfxgH5HsZP5wx4fjLNTCMmANb5tbafYE2IyJ6cVK6Y--pCFufss1wuDREhN1wZSov9-2D74JWPDhKxQNjuwwbswHDhMyv_jPDGasqQmgaipOZCMYdWQlghTcE_WahPsFpyUnKXY5MJeaEcE1OBEqIfvh74BJB5w9jiFXo2AT6HMRx8NiuTEFg/s320/Azure%20AD.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;1. Identify Azure AD Assets:&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Create an inventory of all Azure AD assets, including user accounts, groups, applications, service principals, and Azure AD resources.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Document the purpose and sensitivity level of each asset.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Classify assets based on their importance and criticality to the organization, considering factors such as the data they provide access to or the applications they authenticate.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;2. Perform a Risk Assessment:&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Identify potential threats to your Azure AD environment, such as unauthorized access, identity theft, insider threats, or data breaches.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Assess vulnerabilities that could be exploited by conducting a comprehensive assessment of your Azure AD configuration and associated resources.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Evaluate the potential impact of each threat and vulnerability on the confidentiality, integrity, and availability of your Azure AD assets.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Determine the likelihood of each risk occurring based on historical data, industry trends, and the organization&#39;s threat landscape.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Prioritize risks based on their potential impact and likelihood, focusing on those with the highest potential risk to your Azure AD environment.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;3. Define Security Objectives:&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Review your organization&#39;s overall security strategy and compliance requirements, including any specific Azure AD security requirements.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Identify specific security objectives that align with these requirements and the risk assessment findings. Ensure these objectives are measurable and relevant to your organization&#39;s needs.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Examples of security objectives for Azure AD may include enforcing strong authentication policies, implementing conditional access controls, and protecting privileged accounts.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;4. Select Security Controls:&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Research and review Azure AD security best practices, Azure Security Center recommendations, and Azure AD-specific security frameworks.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Identify security controls available in Azure AD that address the identified risks and align with your security objectives.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Examples of security controls for Azure AD include enabling multi-factor authentication (MFA), implementing conditional access policies, using Azure AD Privileged Identity Management (PIM), and leveraging Azure AD Identity Protection.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Consider using Azure AD security features such as Azure AD Conditional Access, Azure AD Identity Governance, and Azure AD Privileged Identity Management to enhance your security posture.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;5. Design Azure AD Security Architecture:&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Plan the structure of your Azure AD tenant, considering factors such as the number of Azure AD directories, users, groups, and applications required.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Define the authentication and access models to be used, such as cloud-only identities, hybrid identities with Azure AD Connect, or federation with external identity providers.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Determine the appropriate Azure AD license level and edition based on your organization&#39;s needs for advanced security features.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Design RBAC roles and assignments for Azure AD resources, ensuring least privilege principles are followed.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Establish Azure AD security policies, including password policies, sign-in risk policies, and device compliance policies.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;6. Implement Security Controls:&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Enable multi-factor authentication (MFA) for Azure AD accounts, especially for privileged accounts and accounts with access to sensitive resources.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Implement conditional access policies to enforce granular access controls based on user, device, location, and risk factors.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Utilize Azure AD Identity Protection to detect and respond to suspicious sign-in activities and risky user behaviors.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Leverage Azure AD Privileged Identity Management (PIM) to manage and monitor privileged access to Azure AD and other Azure resources.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Regularly review and remediate risky sign-in events, risky users, and vulnerable configurations identified by Azure AD security features.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;7. Provide User Training and Awareness:&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Develop training materials and conduct sessions to educate users about Azure AD security best practices.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Train users on the importance of strong passwords, avoiding password reuse, and using MFA for enhanced security.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Educate users about recognizing and reporting phishing attempts, suspicious sign-in activities, and other potential security risks.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Raise awareness about the importance of safeguarding Azure AD credentials, avoiding sharing of accounts, and promptly reporting any unusual activities or potential security breaches.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;8. Establish Incident Response Procedures:&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Develop an incident response plan specifically for Azure AD security incidents.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Define roles and responsibilities for incident response team members, including those responsible for handling Azure AD security incidents.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Establish communication protocols and reporting mechanisms to ensure prompt detection, response, and resolution of Azure AD security incidents.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Document step-by-step procedures for isolating affected accounts, investigating potential breaches, resetting compromised credentials, and implementing necessary security measures to prevent future incidents.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Conduct regular drills and exercises to test the effectiveness of the incident response procedures and identify areas for improvement.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;9. Implement Monitoring and Auditing:&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Enable Azure AD auditing to track and monitor activities such as user sign-ins, application registrations, role assignments, and directory changes.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Utilize Azure AD logs and Azure Monitor to collect and analyze security-related events and alerts.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Configure alerts and notifications for suspicious activities, such as multiple failed sign-in attempts or privilege escalations.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Integrate Azure AD with a Security Information and Event Management (SIEM) system for centralized log management, analysis, and correlation.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Regularly review and analyze Azure AD logs and security reports to identify anomalies, detect security incidents, and take appropriate actions to mitigate risks.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;10. Regular Assessment and Improvement:&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Continuously assess the effectiveness of your Azure AD security controls.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Stay informed about Azure AD security updates, new security features, and best practices provided by Microsoft.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Conduct periodic security assessments and penetration testing to identify vulnerabilities and weaknesses in your Azure AD environment.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Monitor Azure Security Center recommendations and implement necessary security improvements.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Regularly review and update your Azure AD security controls, policies, and procedures to adapt to emerging threats, industry standards, and regulatory requirements.&lt;/p&gt;&lt;p&gt;Certainly! Here&#39;s an expanded and elaborated checklist for developing and implementing security controls in Azure AD and AWS:&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Checklist for Azure AD Security:&lt;/p&gt;&lt;p&gt;------------------------------------&lt;/p&gt;&lt;p&gt;| Step&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; | Status&amp;nbsp;&lt;/p&gt;&lt;p&gt;1 Identify Azure AD Assets&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp; - List all Azure AD resources and services being used, such as users, groups, applications, and roles.&amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;2 Perform a Risk Assessment&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Identify potential threats and vulnerabilities specific to Azure AD.&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Assess the impact and likelihood of each risk.&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;3 Define Security Objectives&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp; - Clearly define and document the desired security objectives for Azure AD.&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp; - Ensure objectives align with organizational requirements and compliance standards.&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;4 Select Security Controls&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Research and identify Azure AD-specific security controls provided by Microsoft.&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp; - Choose controls that address identified risks and align with security objectives.&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;5 Design Azure AD Security Architecture&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Plan the structure of Azure AD, including directory structure and role assignments.&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Define secure connectivity options and network configurations.&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp; - Establish data encryption strategies for Azure AD.&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/p&gt;&lt;p&gt;6 Implement Security Controls&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Enable multi-factor authentication (MFA) for Azure AD users.&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Configure strong password policies and password rotation requirements.&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Implement Azure AD Privileged Identity Management (PIM) for access management.&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Enable auditing and logging for Azure AD activities.&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;7 Provide User Training and Awareness&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Educate users about Azure AD security best practices and potential threats.&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Train users on recognizing and reporting security incidents or suspicious activities.&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;7 Establish Incident Response Procedures&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp; - Develop an incident response plan specific to Azure AD security incidents.&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp; - Define roles and responsibilities for incident response team members.&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp; - Establish communication protocols and reporting mechanisms for incidents.&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;9 Implement Monitoring and Auditing&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp; - Enable Azure AD auditing and configure logs for monitoring and analysis.&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Set up alerts and notifications for suspicious activities or policy violations.&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Integrate Azure AD logs with a centralized logging and monitoring system.&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/p&gt;&lt;p&gt;10 Regular Assessment and Improvement&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Conduct regular security assessments and vulnerability scans for Azure AD.&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp; - Stay informed about Azure AD security updates and best practices.&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp; - Continuously review and update Azure AD security controls and policies.&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/p&gt;&lt;p&gt;Remember that security is an ongoing process, and it&#39;s important to regularly evaluate and improve the security posture of your Azure AD environment to stay ahead of potential threats and ensure the protection of your organization&#39;s identity and access management infrastructure.&lt;/p&gt;&lt;p&gt;Finally here is an excellent blogpost by Mandiant for cloud platform compromise with multiple components that would require investigation&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.mandiant.com/resources/blog/cloud-bad-log-configurations&quot;&gt;https://www.mandiant.com/resources/blog/cloud-bad-log-configurations&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.maximusit.net/feeds/4098457416458642314/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.maximusit.net/2023/06/developing-and-implementing-security.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/4098457416458642314'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/4098457416458642314'/><link rel='alternate' type='text/html' href='http://www.maximusit.net/2023/06/developing-and-implementing-security.html' title='Developing and implementing security controls for Azure Active Directory (Azure AD)'/><author><name>Faysal Hasan</name><uri>http://www.blogger.com/profile/11837891241239740342</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrQEqUTKfxgH5HsZP5wx4fjLNTCMmANb5tbafYE2IyJ6cVK6Y--pCFufss1wuDREhN1wZSov9-2D74JWPDhKxQNjuwwbswHDhMyv_jPDGasqQmgaipOZCMYdWQlghTcE_WahPsFpyUnKXY5MJeaEcE1OBEqIfvh74BJB5w9jiFXo2AT6HMRx8NiuTEFg/s72-c/Azure%20AD.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8774245130267339525.post-5157743638645483</id><published>2023-05-31T00:05:00.005+10:00</published><updated>2023-05-31T01:02:05.309+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cyber"/><category scheme="http://www.blogger.com/atom/ns#" term="Programming"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><title type='text'>Explore Microsoft Bing Chat </title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;&lt;p&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOi7oZxC0-qzKjKVcqQ2owaafx6Nke05AJ8QF4Gqsp2Mbi8Md2Z3NFA-wUazIDnmddzX7n9iPh3YGUYdxaBg_TV5eYaK7x2eoJsX3lpEXNqdlqYWco85ZMkkUXA8z1bZFp9r-kyzDIdZhbvzoUqNxhxw9FWjrXnhtlTanWxnhnMoq-8Q9GDP_x9AYF7w/s538/AI.png&quot; imageanchor=&quot;1&quot; style=&quot;font-family: verdana; margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;324&quot; data-original-width=&quot;538&quot; height=&quot;229&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOi7oZxC0-qzKjKVcqQ2owaafx6Nke05AJ8QF4Gqsp2Mbi8Md2Z3NFA-wUazIDnmddzX7n9iPh3YGUYdxaBg_TV5eYaK7x2eoJsX3lpEXNqdlqYWco85ZMkkUXA8z1bZFp9r-kyzDIdZhbvzoUqNxhxw9FWjrXnhtlTanWxnhnMoq-8Q9GDP_x9AYF7w/w380-h229/AI.png&quot; width=&quot;380&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Explore Microsoft Bing Chat is a new feature that allows business users to interact with Microsoft Bing in a conversational way. You can ask Microsoft Bing questions, get insights, create content, and more in natural language. Microsoft Bing responds with informative, intuitive, logical, and actionable responses to help you get things done faster and easier.&amp;nbsp;&amp;nbsp; In this blog post, we&#39;ll show you how to use Discover chat on Microsoft Bing and how it can benefit your work.&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&amp;nbsp;Here are some steps to get started:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;ul&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Go to https://www.bing.com and click&amp;nbsp; the chat icon in the lower right corner of the screen.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&amp;nbsp;Select your preferred language and mode from the options.You can switch
 between Balanced, Creative, and Precision modes according to your needs
 and preferences.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Type or speak your request or message to Microsoft Bing.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;You can use voice input by clicking&amp;nbsp; the microphone icon next to the text box.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Microsoft Bing will respond with&amp;nbsp; relevant and engaging feedback, 
which can include web results, images, tables, lists, code blocks, LaTex
 expressions, and more. You can also see suggestions for the next user&amp;nbsp; 
at the bottom of the chat box.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;You can continue the conversation by following the suggestions or by 
typing or speaking your own request or message. You can also click on 
the link or reference in the Microsoft Bing response to explore more 
information. &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLi61bAed8Qw8CsVBcWbyDXNiTZzdOyOEpCRjCs2uzXckgtigkBXP3hZmoGzVNFkpgMttERz0Gpak5H8CbA2kUsGA7GgZoVah5lqR3J4JuN-MFxrk-e3k04lEzEq12PA7wmxpdBR_wbiqyVZbEyfzTghDbHArL0fufnXDddXx3kcfZjuAoP3iRampPkQ/s563/BING%20chat%20compose.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;325&quot; data-original-width=&quot;563&quot; height=&quot;185&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLi61bAed8Qw8CsVBcWbyDXNiTZzdOyOEpCRjCs2uzXckgtigkBXP3hZmoGzVNFkpgMttERz0Gpak5H8CbA2kUsGA7GgZoVah5lqR3J4JuN-MFxrk-e3k04lEzEq12PA7wmxpdBR_wbiqyVZbEyfzTghDbHArL0fufnXDddXx3kcfZjuAoP3iRampPkQ/s320/BING%20chat%20compose.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXue50jfBvhYEuCPf5vxWfjxAHqkzh6ZGQj_vt5ew0osHzPKIxMmTEJwf69fNZYannvwFz8cmw8Rpj75s1P5q0LfpTiKEO7ll7HRxghKwp0m4jTzGd1vrCorS6A6-p21Vu9oyYLySwadpPXWoJElhVgfh8yc4ljwYdCSz_JGj98AOdH-PMxZDTeRpMIQ/s595/BING%20chat.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;593&quot; data-original-width=&quot;595&quot; height=&quot;319&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXue50jfBvhYEuCPf5vxWfjxAHqkzh6ZGQj_vt5ew0osHzPKIxMmTEJwf69fNZYannvwFz8cmw8Rpj75s1P5q0LfpTiKEO7ll7HRxghKwp0m4jTzGd1vrCorS6A6-p21Vu9oyYLySwadpPXWoJElhVgfh8yc4ljwYdCSz_JGj98AOdH-PMxZDTeRpMIQ/s320/BING%20chat.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&amp;nbsp; &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Chat on Microsoft Bing is a feature that allows you to interact with Bing in a conversational way. You can ask questions, get information, and even generate content using natural language. Chat on Microsoft Bing has three main components:&lt;br /&gt;&lt;br /&gt;- &lt;b&gt;Chat:&lt;/b&gt; This is where you can type your messages and see Bing&#39;s responses. You can also switch between different modes, such as Balanced, Creative, and Precise, to get different types of responses from Bing.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;- &lt;b&gt;Compose:&lt;/b&gt; This is where you can use Bing&#39;s creativity and intelligence to help you write or improve your own content. You can ask Bing to generate poems, stories, code, summaries, lyrics, and more. You can also ask Bing to rewrite, optimize, or enhance your content.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;b&gt;- Insights: &lt;/b&gt;This is where you can see additional information and details related to your chat messages. You can see web search results, question answering results, advertisements, and suggestions for the next user turn. &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Microsoft Bing chat discovery is designed to help you find answers, create content, and complete tasks naturally and intuitively. Whether you need to research a topic, write a report, create a presentation, or just have&amp;nbsp; fun, you can use the Explore chat on Microsoft Bing to boost your productivity and creativity. Try it&amp;nbsp; today and let us know what you think.&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.maximusit.net/feeds/5157743638645483/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.maximusit.net/2023/05/explore-microsoft-bing-chat.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/5157743638645483'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/5157743638645483'/><link rel='alternate' type='text/html' href='http://www.maximusit.net/2023/05/explore-microsoft-bing-chat.html' title='Explore Microsoft Bing Chat '/><author><name>Faysal Hasan</name><uri>http://www.blogger.com/profile/11837891241239740342</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOi7oZxC0-qzKjKVcqQ2owaafx6Nke05AJ8QF4Gqsp2Mbi8Md2Z3NFA-wUazIDnmddzX7n9iPh3YGUYdxaBg_TV5eYaK7x2eoJsX3lpEXNqdlqYWco85ZMkkUXA8z1bZFp9r-kyzDIdZhbvzoUqNxhxw9FWjrXnhtlTanWxnhnMoq-8Q9GDP_x9AYF7w/s72-w380-h229-c/AI.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8774245130267339525.post-1186322172145615222</id><published>2023-05-17T18:38:00.001+10:00</published><updated>2023-05-17T18:38:11.491+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cyber"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="viruses"/><title type='text'>Recommendations for Mitigating BianLian Ransomware Group attack</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgr3iHZxVbo_ZuX-yzZ6oS3MTuFuR9hBCIsWn8qxum32LWYOEX1fCBZpaD3EN7YbPjGCpkti33Svn3EIB9s3hqCVAurLH8sUdKnoY9Eo0rLLVsG0-ZR_-ZmQvz-R1dgNBiMZqZW39GNtdsa1vTCrCDWWf2g_j3EpJYo9_CSA81GAp-Vf1ERM3LrRudq0A/s739/BianLian%20Ransomware%20.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;415&quot; data-original-width=&quot;739&quot; height=&quot;180&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgr3iHZxVbo_ZuX-yzZ6oS3MTuFuR9hBCIsWn8qxum32LWYOEX1fCBZpaD3EN7YbPjGCpkti33Svn3EIB9s3hqCVAurLH8sUdKnoY9Eo0rLLVsG0-ZR_-ZmQvz-R1dgNBiMZqZW39GNtdsa1vTCrCDWWf2g_j3EpJYo9_CSA81GAp-Vf1ERM3LrRudq0A/s320/BianLian%20Ransomware%20.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;To enhance your organization&#39;s cybersecurity posture and counter the activities of the BianLian Ransomware Group, we advise implementing the following mitigations. These measures align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and NIST (the National Institute of Standards and Technology). The CPGs outline a minimum set of practices and protections recommended for all organizations, based on existing cybersecurity frameworks and guidance that target common and impactful threats and tactics.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;1. Reduce the risk of malicious actors using remote access tools by taking the following actions:&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Conduct an audit of remote access tools on your network to identify authorized and currently used software.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Review logs to detect abnormal use of portable executable programs running remote access software.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Utilize security software capable of detecting instances where remote access software is loaded only in memory.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Allow authorized remote access solutions strictly from within your network, using approved methods like virtual private networks (VPNs) or virtual desktop interfaces (VDIs).&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Block inbound and outbound connections on common remote access software ports and protocols at the network perimeter.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Implement application controls to manage and control the execution of software, including allowing only approved remote access programs.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Employ application allowlisting to prevent the installation and execution of unauthorized remote access software, including portable versions that evade traditional antivirus solutions.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;For additional guidance, refer to the NSA Cybersecurity Information Sheet on enforcing signed software execution policies.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;2. Strictly limit the use of Remote Desktop Protocol (RDP) and other remote desktop services. If RDP is necessary, adhere to best practices such as:&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Conduct network audits to identify systems using RDP.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Close unused RDP ports.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Enforce account lockouts after a specified number of failed login attempts.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Implement phishing-resistant multifactor authentication (MFA).&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Log RDP login attempts.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Disable command-line and scripting activities and permissions.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Restrict the use of PowerShell to specific users who manage the network or Windows operating systems.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Keep PowerShell updated to the latest version and uninstall older versions.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Enable enhanced PowerShell logging to capture valuable data for monitoring and incident response.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;3. Review domain controllers, servers, workstations, and active directories to identify any new or unrecognized accounts. Audit user accounts with administrative privileges and configure access controls based on the principle of least privilege.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;4. Reduce the risk of credential compromise by implementing the following measures:&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Place domain admin accounts in the protected users&#39; group to prevent local caching of password hashes.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Implement Credential Guard for Windows 10 and Server 2016, or enable Protected Process Light for Local Security Authority (LSA) on Windows Server 2012R2.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Avoid storing plaintext credentials in scripts.&lt;/p&gt;&lt;p&gt;&amp;nbsp; &amp;nbsp;- Implement time-based access for admin-level accounts using methods like Just-in-Time (JIT) access provisioning.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;In addition to the above recommendations, the FBI, CISA, and ACSC suggest the following mitigations to limit the adversarial use of system and network discovery techniques and reduce the impact and risk of ransomware or data extortion:&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;1. Develop and maintain a recovery plan that includes multiple copies of sensitive data and servers stored in physically separate, segmented, and secure locations. Maintain offline backups of data, following the 3-2-1 backup strategy (three copies, two media types, one off-site).&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;2. Ensure that all accounts with password logins comply with NIST standards for password policies. Use longer passwords, store passwords in hashed format using recognized password managers, add password user &quot;salts&quot; to shared login credentials, avoid password reuse, implement multiple failed login attempt account lockouts, disable password hints, and limit&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.maximusit.net/feeds/1186322172145615222/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.maximusit.net/2023/05/recommendations-for-mitigating-bianlian.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/1186322172145615222'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/1186322172145615222'/><link rel='alternate' type='text/html' href='http://www.maximusit.net/2023/05/recommendations-for-mitigating-bianlian.html' title='Recommendations for Mitigating BianLian Ransomware Group attack'/><author><name>Faysal Hasan</name><uri>http://www.blogger.com/profile/11837891241239740342</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgr3iHZxVbo_ZuX-yzZ6oS3MTuFuR9hBCIsWn8qxum32LWYOEX1fCBZpaD3EN7YbPjGCpkti33Svn3EIB9s3hqCVAurLH8sUdKnoY9Eo0rLLVsG0-ZR_-ZmQvz-R1dgNBiMZqZW39GNtdsa1vTCrCDWWf2g_j3EpJYo9_CSA81GAp-Vf1ERM3LrRudq0A/s72-c/BianLian%20Ransomware%20.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8774245130267339525.post-7680911659812085483</id><published>2023-05-14T01:47:00.002+10:00</published><updated>2023-05-14T01:47:32.756+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cyber"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Are you ready to break into the exciting and dynamic world of cybersecurity? </title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhp_q3mwePu14__he2i5iKKxbNgz1l3awx3I-Jg-X8iXpPg3rTLFhzGOuNGEE-rOnuPHvOP-gJxhRQc6Qud6QlZ_dfeUzq3O6H9-w31KmM3o3uBTv1DIlsD0hCipUl1Qw1OGzwSbOPK9dtoEHp_R5PPo30naP1OupG7O-jjzxL7V32iiPogVsXPmGSmRA/s713/Cyber%20Security%20Professional.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;430&quot; data-original-width=&quot;713&quot; height=&quot;193&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhp_q3mwePu14__he2i5iKKxbNgz1l3awx3I-Jg-X8iXpPg3rTLFhzGOuNGEE-rOnuPHvOP-gJxhRQc6Qud6QlZ_dfeUzq3O6H9-w31KmM3o3uBTv1DIlsD0hCipUl1Qw1OGzwSbOPK9dtoEHp_R5PPo30naP1OupG7O-jjzxL7V32iiPogVsXPmGSmRA/s320/Cyber%20Security%20Professional.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;Are you ready to break into the exciting and dynamic world of cybersecurity? It&#39;s not just a job, it&#39;s a lifestyle that attracts a passionate and innovative community of professionals. If you&#39;re eager to join their ranks, follow these 10 steps to cheat your way to success!&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;1.Build a Strong Foundation - turbocharge your career with a comprehensive education in cybersecurity, available through a variety of programs like bootcamps, online courses, degrees, or certifications.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;2. Master Technical Skills - impress potential employers by developing a wide range of technical proficiencies, including hardware, software, Windows/Linux, networking, vulnerability scanners, packet sniffers, Nmap, and other cutting-edge professional tools.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;3.Network Like a Pro - build relationships with cybersecurity experts by joining local or online groups, meeting like-minded individuals, finding mentors, and learning from the best.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;4.Gain Real-World Experience - demonstrate your value by volunteering your skills to help your community and participating in Capture the Flag events to gain hands-on experience.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;5.Choose Your Specialty - customize your career path by specializing in a specific area of cybersecurity, such as offense, defense, GRC, sales, or other specialties.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;6.Stay Ahead of the Curve - stay up-to-date with the latest cybersecurity trends, techniques, and tools by attending security conferences, reading blogs, and constantly improving your skillset.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;7.Build Your Reputation - establish your professional presence online through social media, websites, blogs, podcasts, and other outlets. Give back to the cybersecurity community by sharing your knowledge and expertise.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;8.Get Involved - gain exposure by participating in cybersecurity events and workshops, and volunteering to speak or teach whenever possible.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;9.Stay Ethical - maintain a sterling reputation by always adhering to industry standards and best practices, and never attempting to breach security systems without permission.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;10.Hone Your Soft Skills - sharpen your communication, problem-solving, and teamwork skills, which are essential to your success in the fast-paced world of cybersecurity.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;By following these 10 steps, you&#39;ll be well on your way to building a successful and rewarding career in cybersecurity. Don&#39;t just dream about it – cheat your way to the top with these powerful tips and tricks!&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.maximusit.net/feeds/7680911659812085483/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.maximusit.net/2023/05/are-you-ready-to-break-into-exciting.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/7680911659812085483'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/7680911659812085483'/><link rel='alternate' type='text/html' href='http://www.maximusit.net/2023/05/are-you-ready-to-break-into-exciting.html' title='Are you ready to break into the exciting and dynamic world of cybersecurity? '/><author><name>Faysal Hasan</name><uri>http://www.blogger.com/profile/11837891241239740342</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhp_q3mwePu14__he2i5iKKxbNgz1l3awx3I-Jg-X8iXpPg3rTLFhzGOuNGEE-rOnuPHvOP-gJxhRQc6Qud6QlZ_dfeUzq3O6H9-w31KmM3o3uBTv1DIlsD0hCipUl1Qw1OGzwSbOPK9dtoEHp_R5PPo30naP1OupG7O-jjzxL7V32iiPogVsXPmGSmRA/s72-c/Cyber%20Security%20Professional.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8774245130267339525.post-7353646324619063065</id><published>2023-05-11T22:38:00.004+10:00</published><updated>2023-05-11T22:56:02.594+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><title type='text'>Ransomware Response Plan</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJ8TUNVLxO0P40N6B_qW8sxyBlVyMMZR_isLM0O1Q4Yw7o_uE2ONYleApTbDNf5nngpM8cvGXq5O1U7XqpyGBflwOwgkTG_5xc7LjzKMRCI28hqAxg75YDMWY1aZ3yd2GnPxnRbEZzCQx6-KHEcq4Lb-rG4wxJjIdpMB8iEwsUuf9ZP70FtThQUie8qA/s720/Ransomware%20MaximusIT.jpg&quot; style=&quot;display: block; padding: 1em 0px; text-align: center;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; data-original-height=&quot;378&quot; data-original-width=&quot;720&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJ8TUNVLxO0P40N6B_qW8sxyBlVyMMZR_isLM0O1Q4Yw7o_uE2ONYleApTbDNf5nngpM8cvGXq5O1U7XqpyGBflwOwgkTG_5xc7LjzKMRCI28hqAxg75YDMWY1aZ3yd2GnPxnRbEZzCQx6-KHEcq4Lb-rG4wxJjIdpMB8iEwsUuf9ZP70FtThQUie8qA/s320/Ransomware%20MaximusIT.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;

Here are the key steps for an effective response plan:&amp;nbsp;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&amp;nbsp;1. Don&#39;t Panic:&amp;nbsp;&lt;/div&gt;&lt;div&gt;- Stay calm and act purposefully when targeted by ransomware.&amp;nbsp;&lt;/div&gt;&lt;div&gt;- Seek help from security vendors or report the incident to your insurance company.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&amp;nbsp;2. Isolate Your Systems and Stop the Spread:&lt;/div&gt;&lt;div&gt;&amp;nbsp;- Identify the range of the attack and implement network-level blocks or device-level isolation.&lt;/div&gt;&lt;div&gt;&amp;nbsp;- Utilize endpoint detection and response (EDR) technology to block the attack at the process level.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&amp;nbsp;3. Identify the Ransomware Variant:&amp;nbsp;&lt;/div&gt;&lt;div&gt;- Determine the specific strain of ransomware to understand its behavior and possible decryption options.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&amp;nbsp;4. Identify Initial Access:&lt;/div&gt;&lt;div&gt;&amp;nbsp;- Determine the entry point of the attack to close security holes&lt;/div&gt;&lt;div&gt;.
- Consult digital forensics teams and incident response experts if needed.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&amp;nbsp;5. Identify All Infected Systems and Accounts (Scope):
-&amp;nbsp;&lt;/div&gt;&lt;div&gt;Identify active malware and persistent elements in systems communicating with the command-and-control server.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&amp;nbsp;6. Determine if Data Was Exfiltrated:&amp;nbsp;&lt;/div&gt;&lt;div&gt;- Look for signs of data exfiltration, such as large data transfers or unusual communications.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&amp;nbsp;7. Locate Your Backups and Determine Integrity:
-&lt;/div&gt;&lt;div&gt;&amp;nbsp;Ensure backup technology was not affected and scan backups for integrity.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&amp;nbsp;8. Sanitize Systems or Create New Builds:&amp;nbsp;&lt;/div&gt;&lt;div&gt;- Remove malware and incidents of persistence, or consider creating new, clean systems&lt;/div&gt;&lt;div&gt;.
- Implement appropriate security controls to prevent reinfection.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&amp;nbsp;9. Report the Incident:&amp;nbsp;&lt;/div&gt;&lt;div&gt;- Report the incident and determine if law enforcement should be involved.
Consider legal obligations regarding regulated data.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&amp;nbsp;10. Paying the Ransom?&amp;nbsp;&lt;/div&gt;&lt;div&gt;- Law enforcement advises against paying the ransom&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;.

11. Conduct a Post-Incident Review:&amp;nbsp;&lt;/div&gt;&lt;div&gt;- Evaluate the ransomware response and identify areas for improvement.&amp;nbsp;&lt;/div&gt;&lt;div&gt;- Simulate attack scenarios and consider proactive playbook building.&amp;nbsp;&lt;/div&gt;&lt;div&gt;- Consider external services if IT or security team staffing is limited.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.maximusit.net/feeds/7353646324619063065/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.maximusit.net/2023/05/ransomware-responce-plan.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/7353646324619063065'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/7353646324619063065'/><link rel='alternate' type='text/html' href='http://www.maximusit.net/2023/05/ransomware-responce-plan.html' title='Ransomware Response Plan'/><author><name>Faysal Hasan</name><uri>http://www.blogger.com/profile/11837891241239740342</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJ8TUNVLxO0P40N6B_qW8sxyBlVyMMZR_isLM0O1Q4Yw7o_uE2ONYleApTbDNf5nngpM8cvGXq5O1U7XqpyGBflwOwgkTG_5xc7LjzKMRCI28hqAxg75YDMWY1aZ3yd2GnPxnRbEZzCQx6-KHEcq4Lb-rG4wxJjIdpMB8iEwsUuf9ZP70FtThQUie8qA/s72-c/Ransomware%20MaximusIT.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8774245130267339525.post-7485904353027445975</id><published>2023-01-26T06:37:00.005+11:00</published><updated>2023-05-11T23:35:14.996+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Home based Business"/><category scheme="http://www.blogger.com/atom/ns#" term="Online Earning"/><category scheme="http://www.blogger.com/atom/ns#" term="Programming"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="viruses"/><category scheme="http://www.blogger.com/atom/ns#" term="Web Design and Development"/><title type='text'>Chat GPT Alternatives</title><content type='html'>&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7LfakBsaJPDZEQGKHWlIenlGZfmRxU9qWA03moHiR9oADkub6ui8PrjlB_5NQ9sy7RMDX1A1jSZPHruC55iyKM7hKoR1CY9DEOqmCOPgslH45enewQKlYRqNg1qYLvV6fPsRyK9da_wpdzFNtUl1pUbdKjLBe180tEp-bylC_1qgVMt8csq13NVFOeA/s739/Chat%20GPT.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;415&quot; data-original-width=&quot;739&quot; height=&quot;180&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7LfakBsaJPDZEQGKHWlIenlGZfmRxU9qWA03moHiR9oADkub6ui8PrjlB_5NQ9sy7RMDX1A1jSZPHruC55iyKM7hKoR1CY9DEOqmCOPgslH45enewQKlYRqNg1qYLvV6fPsRyK9da_wpdzFNtUl1pUbdKjLBe180tEp-bylC_1qgVMt8csq13NVFOeA/s320/Chat%20GPT.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;OpenAI’s Chat GPT offers the reality of high-performing AI chatbots. The purpose of these chatbots is to communicate with users in a conversational manner. And being open source, users can suggest any improvements.&amp;nbsp;&lt;/p&gt;&lt;p&gt;As a result, this technology has taken the internet by storm. Millions of users are using it, but there have been some issues with this chatbot. Particularly when Chat GPT is at capacity and users cannot access it.&lt;/p&gt;&lt;p&gt;Therefore it’s good to know about some quality Chat GPT alternatives. Here are some options that can help you to level up with AI more easily if Chat GPT is not working for you. Some are more complex, and others far more accessible, while some are free and others have pricing structures too.&lt;/p&gt;&lt;p&gt;Chat GPT Alternatives – examples&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_r7cLaeJ3tK7uTrmQiDt3IYuOOgz7z3JPrugmAKdWe1bwao7u8RpwJ52XXAxeMlibaj-8fiC6uJ6NgT6wn12qWtr9AD_mn9nH2RDWNU576vviDIA-JNx8qE10aR24plvEJbqChcbWXI_mNNq30ay7VZlY0j1zxC3vDK4hq9WLQt87mtKOAa5WUFaF7Q/s1412/Chat%20GPT%20alternative.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1412&quot; data-original-width=&quot;1066&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_r7cLaeJ3tK7uTrmQiDt3IYuOOgz7z3JPrugmAKdWe1bwao7u8RpwJ52XXAxeMlibaj-8fiC6uJ6NgT6wn12qWtr9AD_mn9nH2RDWNU576vviDIA-JNx8qE10aR24plvEJbqChcbWXI_mNNq30ay7VZlY0j1zxC3vDK4hq9WLQt87mtKOAa5WUFaF7Q/s320/Chat%20GPT%20alternative.jpg&quot; width=&quot;242&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Bloom&lt;/b&gt;&lt;/p&gt;&lt;p&gt;Blo Bloom om is an open-source multi-language model. This Chat GPT alternative added 384 graphic cards with a total of 80 GB of memory to 176 billion parameters to train – 1 billion more than the GPT 3 model.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Chinchilla&lt;/b&gt;&lt;/p&gt;&lt;p&gt;DeepMind researchers developed a project named Chinchilla, which is more intimately known as the GPT3 killer.&lt;/p&gt;&lt;p&gt;It’s an optimal computing model that has 70 billion protocols. It has four times more data than Gopher, also developed by DeepMind. Chinchilla is reportedly one of the best options for downstream evaluation tasks (also known as the task a user wants to solve).&lt;/p&gt;&lt;p&gt;It’s a top-notch AI-based writing tool and has educational data on history. Therefore, it can create articles with proper style and structure minus grammatical errors. Without human help, it can produce a useful and readable article in less than an hour.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Megatron&lt;/b&gt;-Turing Natural Language Generation&lt;/p&gt;&lt;p&gt;Microsoft and Nvidia made a language model with 530 billion parameters, making it bigger and better than others available. Called Megatron-Turing Natural Language Generation, it is one of the best English language models – trained on SuperPOD by the Selene supercomputer.&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Jasper&lt;/b&gt;&lt;/p&gt;&lt;p&gt;Jasper AI is a writing model previously known as Jarvis. Jasper has bought other writing tools, such as Shortly AI and Headline, and these will be integrated into Jasper in the coming years.&lt;/p&gt;&lt;p&gt;You can select a topic and fill out the relevant form, and Jasper will create the article for you according to the instructions you have entered. Jasper has a 5-day free trial, with its ‘starter’ plan starting at $24 per month.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Replika&lt;/b&gt;&lt;/p&gt;&lt;p&gt;Replika is pretty close to Chat GPT in conversational uses, and you can have similar conversations here, too. It can talk and give text replies at any time without delay. It is primarily an AI chatbot you can use to discuss general topics like love and life, just like you do with friends.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;ELSA&lt;/b&gt;&lt;/p&gt;&lt;p&gt;ELSA stands for English Language Speech Assistant, a language learning app. It is available on Android and iOS platforms to download. The app analyzes users’ speech and helps them learn and understand the language.&lt;/p&gt;&lt;p&gt;There are more Chat GPT alternatives too, some with more specific applications than others. Here’s a list of a few, including those mentioned above.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;ELSA has free and Pro options and Pro costs $11.99 for one month, $8.66p/m for three months, and $6.25p/m for one-year access.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Final thoughts&lt;/p&gt;&lt;p&gt;We have discussed some of the top alternatives of Chat GPT above. You can perform a wide range of functions using these alternatives, and there are others too – including Rytr, Socratic and Faceapp – which uses AI modeling on imagery.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;So, when Chat GPT is not working, you’re not sure about the price or if you require another specific application that is more easily served by an alternative, you can use one of these instead.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.maximusit.net/feeds/7485904353027445975/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.maximusit.net/2023/01/chat-gpt-alternatives.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/7485904353027445975'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/7485904353027445975'/><link rel='alternate' type='text/html' href='http://www.maximusit.net/2023/01/chat-gpt-alternatives.html' title='Chat GPT Alternatives'/><author><name>Faysal Hasan</name><uri>http://www.blogger.com/profile/11837891241239740342</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7LfakBsaJPDZEQGKHWlIenlGZfmRxU9qWA03moHiR9oADkub6ui8PrjlB_5NQ9sy7RMDX1A1jSZPHruC55iyKM7hKoR1CY9DEOqmCOPgslH45enewQKlYRqNg1qYLvV6fPsRyK9da_wpdzFNtUl1pUbdKjLBe180tEp-bylC_1qgVMt8csq13NVFOeA/s72-c/Chat%20GPT.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8774245130267339525.post-6164020680878237994</id><published>2023-01-06T23:07:00.008+11:00</published><updated>2023-05-11T23:02:49.295+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="viruses"/><title type='text'>What is Phishing  and  key points to remember</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_YGHfnHdI1WI9OQFyxiNnrd4S3SzUOv2lu95I3BpwwkWUh9l1HwqAohbdAZZ3igDSirFnsqjvKoP9CgFHLVoWq1raLhT7rx7rjM-Xdusl2dWgjil43snDDicLzyiaZl2RNgXD_xc1RCCHM82ROi18E3P6lYdol6B0q9LwnmvaP-T-ztKG2J9yxMvphA/s650/Phishing%20attack.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;433&quot; data-original-width=&quot;650&quot; height=&quot;213&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_YGHfnHdI1WI9OQFyxiNnrd4S3SzUOv2lu95I3BpwwkWUh9l1HwqAohbdAZZ3igDSirFnsqjvKoP9CgFHLVoWq1raLhT7rx7rjM-Xdusl2dWgjil43snDDicLzyiaZl2RNgXD_xc1RCCHM82ROi18E3P6lYdol6B0q9LwnmvaP-T-ztKG2J9yxMvphA/s320/Phishing%20attack.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;What is phishing&lt;/p&gt;&lt;p&gt;Phishing is a type of online scam in which attackers send fraudulent emails or create fake websites with the intention of tricking individuals into divulging sensitive information such as login credentials, credit card numbers, and other financial information. The attackers often pose as trusted organizations or individuals and use various tactics to persuade the victim to click on a link or download an attachment. The link or attachment may contain malware that can infect the victim&#39;s device or redirect the victim to a fake website where they are prompted to enter their personal information.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Phishing attacks can be difficult to recognize because the attackers go to great lengths to make their emails and websites look legitimate. To protect against phishing attacks, it is important to be cautious when clicking on links or downloading attachments in emails, and to verify the authenticity of the sender and the website before entering any personal information. It is also a good idea to use a secure web browser and to keep your antivirus software up to date.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;What is smishing&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Smishing is a type of social engineering attack that involves the use of SMS text messages to trick individuals into divulging sensitive information or clicking on malicious links. Smishing attacks often target mobile phone users and can be used to steal personal information such as login credentials, credit card numbers, and other financial information. Smishers use a variety of tactics to lure victims into falling for their scams, including posing as trusted organizations or individuals, creating a sense of urgency or fear, and offering incentives or rewards. To protect against smishing attacks, it is important to be cautious when receiving text messages from unknown numbers and to verify the authenticity of the message before clicking on any links or providing personal information.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Different type of phishing and their defination&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;There are several different types of phishing attacks, including:&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Spear phishing: This type of phishing attack is targeted at a specific individual or organization and often involves the attacker posing as someone the victim knows or trusts.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Whaling: Similar to spear phishing, but the target is a high-level executive or someone with significant influence within an organization.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Clone phishing: This type of attack involves the attacker sending a legitimate email or creating a fake website that is a copy of a legitimate one, but with a malicious link or attachment.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Vishing: This type of attack involves the use of voice calls or voicemails to trick victims into divulging sensitive information.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Impersonation attacks: These attacks involve the attacker pretending to be someone else, such as a colleague or a customer service representative, in order to obtain sensitive information.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;CEO fraud: Also known as &quot;business email compromise,&quot; this type of attack involves the attacker pretending to be the CEO or another high-level executive and requesting sensitive information or money from an employee.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Some key points to remember about phishing:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Be wary of unexpected or suspicious emails, especially those that contain links or attachments.&lt;/li&gt;&lt;li&gt;Do not click on links or download attachments from unfamiliar or untrusted sources.&lt;/li&gt;&lt;li&gt;Be cautious when providing personal or financial information online, especially in response to an email or unsolicited request.&lt;/li&gt;&lt;li&gt;Pay attention to the website&#39;s address, or URL, before entering sensitive information. Make sure it begins with &quot;https&quot; and has a lock icon, indicating that it is a secure site.&lt;/li&gt;&lt;li&gt;Use anti-virus and anti-malware software and keep it up-to-date.&lt;/li&gt;&lt;li&gt;Use strong and unique passwords for all of your accounts, and enable two-factor authentication if it is available.&lt;/li&gt;&lt;li&gt;Keep your operating system and other software up-to-date with the latest security patches.&lt;/li&gt;&lt;li&gt;Be aware of phishing attacks that use phone calls or text messages as well as email. Do not provide personal or financial information in response to unsolicited phone calls or text messages.&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Remember, if something seems too good to be true or seems suspicious, it is always better to err on the side of caution and not click on links or download attachments from unfamiliar or untrusted sources.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.maximusit.net/feeds/6164020680878237994/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.maximusit.net/2023/01/what-is-phishing-and-key-points-to.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/6164020680878237994'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/6164020680878237994'/><link rel='alternate' type='text/html' href='http://www.maximusit.net/2023/01/what-is-phishing-and-key-points-to.html' title='What is Phishing  and  key points to remember'/><author><name>Faysal Hasan</name><uri>http://www.blogger.com/profile/11837891241239740342</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_YGHfnHdI1WI9OQFyxiNnrd4S3SzUOv2lu95I3BpwwkWUh9l1HwqAohbdAZZ3igDSirFnsqjvKoP9CgFHLVoWq1raLhT7rx7rjM-Xdusl2dWgjil43snDDicLzyiaZl2RNgXD_xc1RCCHM82ROi18E3P6lYdol6B0q9LwnmvaP-T-ztKG2J9yxMvphA/s72-c/Phishing%20attack.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8774245130267339525.post-6794999743692467965</id><published>2023-01-06T22:53:00.003+11:00</published><updated>2024-03-31T18:33:35.322+11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Job Interview and Ideas"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>How to become a successfull cyber security engineer from cyber security analyst</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg31ZOJP25zVybeb9-a2D38_xajPnoSIGqLP0GjzZhkxEp3w-HtmtGCqSjpW2bFYfS9A2dksKs7jS1D2qbgrnqhPKC7vzXRhPIfiwpm2G6FoFXjXGD_pnCF0rZzLUW959Hota738iRS2AXpVi70OHzN83J1MrPxm7B_zW10MBXl9ivKd3_PkKIJkmtJVg/s738/Cyber%20Engineer.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;415&quot; data-original-width=&quot;738&quot; height=&quot;180&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg31ZOJP25zVybeb9-a2D38_xajPnoSIGqLP0GjzZhkxEp3w-HtmtGCqSjpW2bFYfS9A2dksKs7jS1D2qbgrnqhPKC7vzXRhPIfiwpm2G6FoFXjXGD_pnCF0rZzLUW959Hota738iRS2AXpVi70OHzN83J1MrPxm7B_zW10MBXl9ivKd3_PkKIJkmtJVg/s320/Cyber%20Engineer.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Here are some steps you can take to become a successful cyber security engineer from a cyber security analyst:&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Build your technical skills: As a cyber security analyst, you may already have a strong foundation in cyber security technologies and practices. However, to become a cyber security engineer, you should aim to expand your technical skillset and knowledge in areas such as network security, security architecture, and system design.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Gain practical experience: Hands-on experience is crucial in the field of cyber security. Consider volunteering for security-related projects or internships to gain practical experience and build your portfolio.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Pursue additional certifications: Earning industry-recognized certifications such as the Certified Information Systems Security Professional (CISSP) can demonstrate your expertise and commitment to the field.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Develop your leadership skills: Cyber security engineering roles often involve leading and managing teams of analysts. To prepare for these responsibilities, consider taking courses or seeking opportunities to develop your leadership and management skills.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Stay up-to-date: The field of cyber security is constantly evolving, so it&#39;s important to stay current with the latest technologies, trends, and best practices. Consider joining professional organizations or attending conferences to stay informed and connected to the industry.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.maximusit.net/feeds/6794999743692467965/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.maximusit.net/2023/01/how-to-become-successfull-cyber.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/6794999743692467965'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/6794999743692467965'/><link rel='alternate' type='text/html' href='http://www.maximusit.net/2023/01/how-to-become-successfull-cyber.html' title='How to become a successfull cyber security engineer from cyber security analyst'/><author><name>Faysal Hasan</name><uri>http://www.blogger.com/profile/11837891241239740342</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg31ZOJP25zVybeb9-a2D38_xajPnoSIGqLP0GjzZhkxEp3w-HtmtGCqSjpW2bFYfS9A2dksKs7jS1D2qbgrnqhPKC7vzXRhPIfiwpm2G6FoFXjXGD_pnCF0rZzLUW959Hota738iRS2AXpVi70OHzN83J1MrPxm7B_zW10MBXl9ivKd3_PkKIJkmtJVg/s72-c/Cyber%20Engineer.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8774245130267339525.post-123474091256812324</id><published>2023-01-06T22:49:00.004+11:00</published><updated>2023-05-11T23:13:20.486+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Bangladesh"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Job Interview and Ideas"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>What are the key tools to know for cyber security engineering role</title><content type='html'>&lt;div class=&quot;sticky top-0 z-10 flex items-center border-b border-white/20 bg-gray-800 pl-1 pt-1 text-gray-200 sm:pl-3 md:hidden&quot; style=&quot;--tw-bg-opacity: 1; --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-ring-color: rgba(59,130,246,0.5); --tw-ring-offset-color: #fff; --tw-ring-offset-shadow: 0 0 transparent; --tw-ring-offset-width: 0px; --tw-ring-shadow: 0 0 transparent; --tw-rotate: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-scroll-snap-strictness: proximity; --tw-shadow-colored: 0 0 transparent; --tw-shadow: 0 0 transparent; --tw-skew-x: 0; --tw-skew-y: 0; --tw-text-opacity: 1; --tw-translate-x: 0; --tw-translate-y: 0; align-items: center; border-color: rgba(255, 255, 255, 0.2); border-image: initial; border-style: solid; border-width: 0px 0px 1px; box-sizing: border-box; color: rgba(217,217,227,var(--tw-text-opacity)); display: flex; padding-left: 0.25rem; padding-top: 0.25rem; position: sticky; top: 0px; z-index: 10;&quot;&gt;&lt;div style=&quot;border: 0px solid rgb(217, 217, 227); box-sizing: border-box; flex: 1 1 0%; line-height: 1.5rem; margin: 0px; text-align: left;&quot;&gt;&lt;p style=&quot;border: 0px solid rgb(217, 217, 227); box-sizing: border-box; flex: 1 1 0%; line-height: 1.5rem; margin: 0px;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtFA3maOyqKZzkyxZw9-7RP6VVTA57nlIvi7tIN1DoL1DLjZFk4SAX1ZtyJY4A66L8rmmyOD9Lt4rq5vctzxoPjyRA_kmvLM9tCD4obLT2h7Wta1AZuxUtjhDh4uf_-najuIYq4GvanGDFn3s-Nh_AR4uLCHAuWv64MBROoBsxo3uOBd9P8n4Q6z3tVw/s774/Cyber%20tools.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;396&quot; data-original-width=&quot;774&quot; height=&quot;164&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtFA3maOyqKZzkyxZw9-7RP6VVTA57nlIvi7tIN1DoL1DLjZFk4SAX1ZtyJY4A66L8rmmyOD9Lt4rq5vctzxoPjyRA_kmvLM9tCD4obLT2h7Wta1AZuxUtjhDh4uf_-najuIYq4GvanGDFn3s-Nh_AR4uLCHAuWv64MBROoBsxo3uOBd9P8n4Q6z3tVw/s320/Cyber%20tools.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p style=&quot;border: 0px solid rgb(217, 217, 227); box-sizing: border-box; flex: 1 1 0%; line-height: 1.5rem; margin: 0px;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;border: 0px solid rgb(217, 217, 227); box-sizing: border-box; flex: 1 1 0%; line-height: 1.5rem; margin: 0px;&quot;&gt;Here are some key tools that are commonly used in cyber security engineering roles:&lt;/p&gt;&lt;p style=&quot;border: 0px solid rgb(217, 217, 227); box-sizing: border-box; flex: 1 1 0%; line-height: 1.5rem; margin: 0px;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;border: 0px solid rgb(217, 217, 227); box-sizing: border-box; flex: 1 1 0%; line-height: 1.5rem; margin: 0px;&quot;&gt;Network monitoring tools: These tools allow security engineers to monitor network traffic and identify unusual activity or potential threats. Examples include Wireshark, Splunk, and SolarWinds.&lt;/p&gt;&lt;p style=&quot;border: 0px solid rgb(217, 217, 227); box-sizing: border-box; flex: 1 1 0%; line-height: 1.5rem; margin: 0px;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;border: 0px solid rgb(217, 217, 227); box-sizing: border-box; flex: 1 1 0%; line-height: 1.5rem; margin: 0px;&quot;&gt;Vulnerability scanners: These tools scan systems and networks for known vulnerabilities and provide recommendations for remediation. Examples include Nessus, Qualys, and Rapid7.&lt;/p&gt;&lt;p style=&quot;border: 0px solid rgb(217, 217, 227); box-sizing: border-box; flex: 1 1 0%; line-height: 1.5rem; margin: 0px;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;border: 0px solid rgb(217, 217, 227); box-sizing: border-box; flex: 1 1 0%; line-height: 1.5rem; margin: 0px;&quot;&gt;Security information and event management (SIEM) systems: These systems collect and analyze security-related data from various sources to identify potential threats and provide alerts. Examples include Splunk, LogRhythm, and IBM QRadar.&lt;/p&gt;&lt;p style=&quot;border: 0px solid rgb(217, 217, 227); box-sizing: border-box; flex: 1 1 0%; line-height: 1.5rem; margin: 0px;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;border: 0px solid rgb(217, 217, 227); box-sizing: border-box; flex: 1 1 0%; line-height: 1.5rem; margin: 0px;&quot;&gt;Password managers: These tools help security engineers store and manage complex passwords securely. Examples include LastPass and 1Password.&lt;/p&gt;&lt;p style=&quot;border: 0px solid rgb(217, 217, 227); box-sizing: border-box; flex: 1 1 0%; line-height: 1.5rem; margin: 0px;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;border: 0px solid rgb(217, 217, 227); box-sizing: border-box; flex: 1 1 0%; line-height: 1.5rem; margin: 0px;&quot;&gt;Encryption tools: These tools are used to protect data by encoding it in a way that can only be accessed by those with the correct decryption key. Examples include BitLocker (for Windows) and FileVault (for Mac).&lt;/p&gt;&lt;p style=&quot;border: 0px solid rgb(217, 217, 227); box-sizing: border-box; flex: 1 1 0%; line-height: 1.5rem; margin: 0px;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;border: 0px solid rgb(217, 217, 227); box-sizing: border-box; flex: 1 1 0%; line-height: 1.5rem; margin: 0px;&quot;&gt;Firewalls: These tools act as a barrier between a network and the Internet, blocking unauthorized access and protecting against cyber threats. Examples include Palo Alto Networks and Check Point.&lt;/p&gt;&lt;p style=&quot;border: 0px solid rgb(217, 217, 227); box-sizing: border-box; flex: 1 1 0%; line-height: 1.5rem; margin: 0px;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;border: 0px solid rgb(217, 217, 227); box-sizing: border-box; flex: 1 1 0%; line-height: 1.5rem; margin: 0px;&quot;&gt;Risk assessment and management tools: These tools help security engineers identify and prioritize risks, and develop strategies for mitigating them. Examples include GRC platforms such as RSA Archer and MetricStream.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.maximusit.net/feeds/123474091256812324/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.maximusit.net/2023/01/what-are-key-tools-to-know-for-cyber.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/123474091256812324'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/123474091256812324'/><link rel='alternate' type='text/html' href='http://www.maximusit.net/2023/01/what-are-key-tools-to-know-for-cyber.html' title='What are the key tools to know for cyber security engineering role'/><author><name>Faysal Hasan</name><uri>http://www.blogger.com/profile/11837891241239740342</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtFA3maOyqKZzkyxZw9-7RP6VVTA57nlIvi7tIN1DoL1DLjZFk4SAX1ZtyJY4A66L8rmmyOD9Lt4rq5vctzxoPjyRA_kmvLM9tCD4obLT2h7Wta1AZuxUtjhDh4uf_-najuIYq4GvanGDFn3s-Nh_AR4uLCHAuWv64MBROoBsxo3uOBd9P8n4Q6z3tVw/s72-c/Cyber%20tools.jpg" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>Melbourne VIC, Australia</georss:featurename><georss:point>-37.8136276 144.9630576</georss:point><georss:box>-55.81498282554233 109.80680760000001 -19.812272374457663 -179.8806924</georss:box></entry><entry><id>tag:blogger.com,1999:blog-8774245130267339525.post-837904124545125523</id><published>2022-10-14T01:23:00.003+11:00</published><updated>2022-10-21T02:18:39.721+11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'> Cyber incident in medibank</title><content type='html'>&lt;p&gt;T&lt;span face=&quot;-apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, sans-serif&quot; style=&quot;color: #111826; font-size: 16px; letter-spacing: -0.16px;&quot;&gt;he Medibank Group detected unusual activity on its network.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgH_YKY4_SyA_80Uj2kzWaaJQYMeucA5mgZ2oOSIjffRkFHfXey-KDIwDfXNzUlCrny9C_M6ql-qDB74JSsGZJbZvXv9xDF1wKveob30ya2NC8j4ZjahW6zdUXspHLsUlMC-lfTXUwvu8X2fY1cKGVhbnjbvnpYnrTiy5QE2C6FPkwKygMUKSBWIU-GMg/s739/Medibank.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;415&quot; data-original-width=&quot;739&quot; height=&quot;180&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgH_YKY4_SyA_80Uj2kzWaaJQYMeucA5mgZ2oOSIjffRkFHfXey-KDIwDfXNzUlCrny9C_M6ql-qDB74JSsGZJbZvXv9xDF1wKveob30ya2NC8j4ZjahW6zdUXspHLsUlMC-lfTXUwvu8X2fY1cKGVhbnjbvnpYnrTiy5QE2C6FPkwKygMUKSBWIU-GMg/s320/Medibank.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;span face=&quot;-apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, sans-serif&quot; style=&quot;color: #111826; font-size: 16px; letter-spacing: -0.16px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p style=&quot;-webkit-font-smoothing: antialiased; box-sizing: border-box; color: #111826; font-family: -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; font-size: 16px; letter-spacing: -0.16px; line-height: 1.4;&quot;&gt;In response to this event,&amp;nbsp; as per Medibank they took immediate steps to contain the incident, and engaged specialised cyber security firms.&lt;/p&gt;&lt;p style=&quot;-webkit-font-smoothing: antialiased; box-sizing: border-box; color: #111826; font-family: -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; font-size: 16px; letter-spacing: -0.16px; line-height: 1.4;&quot;&gt;At this stage there is no evidence that any sensitive data, including customer data, has been accessed.&lt;/p&gt;&lt;p style=&quot;-webkit-font-smoothing: antialiased; box-sizing: border-box; color: #111826; font-family: -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; font-size: 16px; letter-spacing: -0.16px; line-height: 1.4;&quot;&gt;As part of response to this incident, #Medibank will be isolating and removing access to some customer-facing systems to reduce the likelihood of damage to systems or data loss.&lt;/p&gt;&lt;p style=&quot;-webkit-font-smoothing: antialiased; box-sizing: border-box; color: #111826; font-family: -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; font-size: 16px; letter-spacing: -0.16px; line-height: 1.4;&quot;&gt;As Medibank continue to investigate this incident, their priorities are to ensure the ongoing security of customers, our employees, and stakeholder information, and the continued delivery of Medibank services.&lt;/p&gt;&lt;p style=&quot;-webkit-font-smoothing: antialiased; box-sizing: border-box; color: #111826; font-family: -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; font-size: 16px; letter-spacing: -0.16px; line-height: 1.4;&quot;&gt;Investigations are ongoing, and #Medibank will provide regular updates. Medibank&#39;s health services continue to be available to their customers, this includes ability to access customer health providers, as&amp;nbsp; Medibank work through this incident.&lt;/p&gt;&lt;p style=&quot;-webkit-font-smoothing: antialiased; box-sizing: border-box; color: #111826; font-family: -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; font-size: 16px; letter-spacing: -0.16px; line-height: 1.4;&quot;&gt;&lt;span color=&quot;inherit&quot; style=&quot;-webkit-font-smoothing: antialiased; box-sizing: border-box; font-weight: 700;&quot;&gt;Medibank CEO David Koczkar said:&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;-webkit-font-smoothing: antialiased; box-sizing: border-box; color: #111826; font-family: -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; font-size: 16px; letter-spacing: -0.16px; line-height: 1.4;&quot;&gt;“I apologise and acknowledge that in the current environment this news may make people concerned.&lt;/p&gt;&lt;p style=&quot;-webkit-font-smoothing: antialiased; box-sizing: border-box; color: #111826; font-family: -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; font-size: 16px; letter-spacing: -0.16px; line-height: 1.4;&quot;&gt;&quot;Our highest priority is resolving this matter as transparently and quickly as possible.&lt;/p&gt;&lt;p style=&quot;-webkit-font-smoothing: antialiased; box-sizing: border-box; color: #111826; font-family: -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; font-size: 16px; letter-spacing: -0.16px; line-height: 1.4;&quot;&gt;“We will continue to take decisive action to protect Medibank Group customers and our people.&lt;/p&gt;&lt;p style=&quot;-webkit-font-smoothing: antialiased; box-sizing: border-box; color: #111826; font-family: -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; font-size: 16px; letter-spacing: -0.16px; line-height: 1.4;&quot;&gt;“We recognise the significant responsibility we have to the people who rely on us to look after their health and wellbeing and whose data we hold.&lt;/p&gt;&lt;p style=&quot;-webkit-font-smoothing: antialiased; box-sizing: border-box; color: #111826; font-family: -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; font-size: 16px; letter-spacing: -0.16px; line-height: 1.4;&quot;&gt;&quot;We are working around the clock to understand the full nature of the incident, and any additional impact this incident may have on our customers, our people and our broader ecosystem.&quot;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgV0nLzdJhNskk3vHShv9hmg5tzLTRr4PG4wnluPaQdZrRObCpDQ3Wyw3DFlhCdUr9D_i_YXqrqQABmeWlGbsjORYyO0DMfonV5po6VJz5MXaS7esZ_MFUSCCOMb9S-3Mm7_M_lfrJ-mEGCcUmauJZ1s2_39yNcfziK4hsucu6Xq1DfjGrcEx38yTMmgA/s1080/image_0adf4764-8d68-4848-8bd3-8cc9e25cf23420221021_021629.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;868&quot; data-original-width=&quot;1080&quot; height=&quot;257&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgV0nLzdJhNskk3vHShv9hmg5tzLTRr4PG4wnluPaQdZrRObCpDQ3Wyw3DFlhCdUr9D_i_YXqrqQABmeWlGbsjORYyO0DMfonV5po6VJz5MXaS7esZ_MFUSCCOMb9S-3Mm7_M_lfrJ-mEGCcUmauJZ1s2_39yNcfziK4hsucu6Xq1DfjGrcEx38yTMmgA/w320-h257/image_0adf4764-8d68-4848-8bd3-8cc9e25cf23420221021_021629.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p style=&quot;-webkit-font-smoothing: antialiased; box-sizing: border-box; color: #111826; font-family: -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; font-size: 16px; letter-spacing: -0.16px; line-height: 1.4;&quot;&gt;&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.maximusit.net/feeds/837904124545125523/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.maximusit.net/2022/10/cyber-incident-in-medibank.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/837904124545125523'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/837904124545125523'/><link rel='alternate' type='text/html' href='http://www.maximusit.net/2022/10/cyber-incident-in-medibank.html' title=' Cyber incident in medibank'/><author><name>Faysal Hasan</name><uri>http://www.blogger.com/profile/11837891241239740342</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgH_YKY4_SyA_80Uj2kzWaaJQYMeucA5mgZ2oOSIjffRkFHfXey-KDIwDfXNzUlCrny9C_M6ql-qDB74JSsGZJbZvXv9xDF1wKveob30ya2NC8j4ZjahW6zdUXspHLsUlMC-lfTXUwvu8X2fY1cKGVhbnjbvnpYnrTiy5QE2C6FPkwKygMUKSBWIU-GMg/s72-c/Medibank.jpg" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>Melbourne VIC, Australia</georss:featurename><georss:point>-37.8136276 144.9630576</georss:point><georss:box>-66.123861436178842 109.80680760000001 -9.5033937638211512 -179.8806924</georss:box></entry><entry><id>tag:blogger.com,1999:blog-8774245130267339525.post-3043833617485166372</id><published>2022-10-02T03:59:00.002+11:00</published><updated>2022-10-02T04:01:01.798+11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Zero-day Vulnerabilities in Microsoft Exchange Server.</title><content type='html'>&lt;p&gt;Microsoft has released&amp;nbsp;Customer Guidance for Reported &lt;b&gt;#zeroday&lt;/b&gt; &lt;b&gt;#Vulnerabilities&lt;/b&gt; in &lt;b&gt;#Microsoft&lt;/b&gt; &lt;b&gt;#Exchange&lt;/b&gt; Server. According to the blog post, “Microsoft is aware of limited targeted attacks using the two vulnerabilities to get into users’ systems.”&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGLusOdsEkOh2atocBhbQadFJ5WPYEXhLai5KSRecfwv7xtlxqBSf5QTICFpVyxFtAzCI1OVExg1JqkMmN4deevnf0Q-2D_Am3bIzNeihOpYVjshk-Q1K2VEVYmaoF1_Hs9tsTUtmw4zrQtD5P8yLvCyzWdvq15LxDhbGJjYZdE9U-OiIV8qGXUb1y4w/s1024/Microsoft%20Exchange%20zeroday.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;642&quot; data-original-width=&quot;1024&quot; height=&quot;201&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGLusOdsEkOh2atocBhbQadFJ5WPYEXhLai5KSRecfwv7xtlxqBSf5QTICFpVyxFtAzCI1OVExg1JqkMmN4deevnf0Q-2D_Am3bIzNeihOpYVjshk-Q1K2VEVYmaoF1_Hs9tsTUtmw4zrQtD5P8yLvCyzWdvq15LxDhbGJjYZdE9U-OiIV8qGXUb1y4w/s320/Microsoft%20Exchange%20zeroday.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;The two vulnerabilities are CVE-2022-41040 and CVE-2022-41082, affecting on-premises Microsoft &lt;b&gt;#Exchange&lt;/b&gt; Server 2013, 2016, and 2019.&amp;nbsp;Note:&amp;nbsp;Microsoft Exchange Online is not affected.&amp;nbsp;&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;An attacker could exploit these vulnerabilities to take control of an affected system.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;The current Exchange Server &lt;b&gt;#mitigation&lt;/b&gt; is to add a blocking rule in “IIS Manager -&amp;gt; Default Web Site -&amp;gt; URL Rewrite -&amp;gt; Actions” to block the known attack patterns how to do it is describe in the below microsoft&amp;nbsp; blogpost&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;&lt;a href=&quot;https://msrc-blog.microsoft.com/2022/09/29/customer-guidance-for-reported-zero-day-vulnerabilities-in-microsoft-exchange-server/&quot;&gt;https://msrc-blog.microsoft.com/2022/09/29/customer-guidance-for-reported-zero-day-vulnerabilities-in-microsoft-exchange-server/&lt;/a&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.maximusit.net/feeds/3043833617485166372/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.maximusit.net/2022/10/zero-day-vulnerabilities-in-microsoft.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/3043833617485166372'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/3043833617485166372'/><link rel='alternate' type='text/html' href='http://www.maximusit.net/2022/10/zero-day-vulnerabilities-in-microsoft.html' title='Zero-day Vulnerabilities in Microsoft Exchange Server.'/><author><name>Faysal Hasan</name><uri>http://www.blogger.com/profile/11837891241239740342</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGLusOdsEkOh2atocBhbQadFJ5WPYEXhLai5KSRecfwv7xtlxqBSf5QTICFpVyxFtAzCI1OVExg1JqkMmN4deevnf0Q-2D_Am3bIzNeihOpYVjshk-Q1K2VEVYmaoF1_Hs9tsTUtmw4zrQtD5P8yLvCyzWdvq15LxDhbGJjYZdE9U-OiIV8qGXUb1y4w/s72-c/Microsoft%20Exchange%20zeroday.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8774245130267339525.post-5309875397754254348</id><published>2022-09-27T12:24:00.006+10:00</published><updated>2022-09-28T03:32:26.341+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><title type='text'>Optus data breach: what to do if you think you&#39;re at risk</title><content type='html'>&lt;div style=&quot;background-color: #141414; color: #e1e1e1; margin: 0cm 0cm 0.0001pt; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;color: #e1e1e1;&quot;&gt;&lt;span&gt;On 22 September 2022, Optus published an article on its website, advising customers of a Cyberattack which may have resulted in unauthorised access to current and former customers’ information.&lt;/span&gt;&lt;/span&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;color: #e1e1e1;&quot;&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;color: #e1e1e1;&quot;&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span face=&quot;Calibri, sans-serif&quot; style=&quot;color: #e1e1e1;&quot;&gt;&lt;span&gt;Optus has advised the information potentially exposed may include customers’ names, dates of&amp;nbsp; birth, phone numbers, email addresses, and, for a subset of customers, addresses, and ID document numbers such as driver license or passport numbers.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&amp;nbsp;&lt;br /&gt;&lt;b&gt;Payment detail and account&amp;nbsp; passwords have not been compromised.&lt;br /&gt;&lt;/b&gt;&amp;nbsp;&lt;br /&gt;Optus has advised that customers that had the most fields exposed would be contacted first over&amp;nbsp; the next few days. It is likely that if you are not contacted by Optus in the next few days, that you &amp;nbsp;are not in this cohort of individuals.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background-color: #141414; color: #e1e1e1; margin: 0cm 0cm 0.0001pt; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;Please note that notification from Optus is occurring via email and Optus will not provide any links&amp;nbsp; in email or contact you via sms or phone call asking you to verify any personal details or billing&amp;nbsp; information. If you are contacted via SMS or phone, do not engage, contact Optus directly through&amp;nbsp; a verified point of contact.&lt;br /&gt;&amp;nbsp;&lt;br /&gt;If you have received an email, by Optus for data breach notification. By acting quickly, you can reduce your chance of experiencing harm.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background-color: #141414; color: #e1e1e1; margin: 0cm 0cm 0.0001pt; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background-color: #141414; color: #e1e1e1; margin: 0cm 0cm 0.0001pt; text-align: left;&quot;&gt;&lt;p style=&quot;background-color: white; box-sizing: border-box; color: #404040; line-height: 1.5; margin: 24px 0px 6px;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;how you can check exactly what data of yours might have been leaked. First log-in here:&amp;nbsp;&lt;a href=&quot;https://www.optus.com.au/&quot; style=&quot;background-color: transparent; box-sizing: border-box; color: #008aff; text-decoration-line: none;&quot;&gt;https://www.optus.com.au/&lt;/a&gt;&amp;nbsp;and then once logged-in, visit&amp;nbsp;&lt;a href=&quot;https://www.optus.com.au/mcssapi/rp-webapp-9-common/user/information&quot; style=&quot;background-color: transparent; box-sizing: border-box; color: #008aff; text-decoration-line: none;&quot;&gt;this link&lt;/a&gt;&amp;nbsp;and you should see a JSON encoded response that contains your personal information. Check in particular the&amp;nbsp;&lt;code style=&quot;background-color: #f9f2f4; border-radius: 4px; box-sizing: border-box; color: #c7254e; padding: 2px 4px;&quot;&gt;indentType&lt;/code&gt;&amp;nbsp;[sic] field, which should tell you what kind of document has been exposed; and the&amp;nbsp;&lt;code style=&quot;background-color: #f9f2f4; border-radius: 4px; box-sizing: border-box; color: #c7254e; padding: 2px 4px;&quot;&gt;indentValue&lt;/code&gt;&amp;nbsp;[again, sic—who wrote this data schema?] which in my case tells me exactly which document I should get re-issued.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;background-color: white; box-sizing: border-box; color: #404040; line-height: 1.5; margin: 24px 0px 6px;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;If you don’t mind jumping through a few hoops, you can also confirm what street address details might have been exposed. To do that, first write down the numeric&amp;nbsp;&lt;code style=&quot;background-color: #f9f2f4; border-radius: 4px; box-sizing: border-box; color: #c7254e; padding: 2px 4px;&quot;&gt;contactId&lt;/code&gt;&amp;nbsp;value from the JSON response you got above. Then take the following URL&amp;nbsp;&lt;code style=&quot;background-color: #f9f2f4; border-radius: 4px; box-sizing: border-box; color: #c7254e; padding: 2px 4px;&quot;&gt;&lt;a class=&quot;vglnk&quot; href=&quot;https://www.optus.com.au/mcssapi/rp-webapp-9-common/customer-management/contact-person/%7BcontactId%7D?lo=en_US&amp;amp;sc=SS&quot; rel=&quot;nofollow&quot; style=&quot;background-color: transparent; box-sizing: border-box; color: #008aff; text-decoration-line: none;&quot;&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;https&lt;/span&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;://&lt;/span&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;www&lt;/span&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;.&lt;/span&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;optus&lt;/span&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;.&lt;/span&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;com&lt;/span&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;.&lt;/span&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;au&lt;/span&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;/&lt;/span&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;mcssapi&lt;/span&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;/&lt;/span&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;rp&lt;/span&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;-&lt;/span&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;webapp&lt;/span&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;-&lt;/span&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;9&lt;/span&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;-&lt;/span&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;common&lt;/span&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;/&lt;/span&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;customer&lt;/span&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;-&lt;/span&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;management&lt;/span&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;/&lt;/span&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;contact&lt;/span&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;-&lt;/span&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;person&lt;/span&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;/{&lt;/span&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;contactId&lt;/span&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;}?&lt;/span&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;lo&lt;/span&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;=&lt;/span&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;en&lt;/span&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;_&lt;/span&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;US&lt;/span&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;&amp;amp;&lt;/span&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;sc&lt;/span&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;=&lt;/span&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;SS&lt;/span&gt;&lt;/a&gt;&lt;/code&gt;&amp;nbsp;and copy and paste it into the address bar of your browser. Manually replace the part that says&amp;nbsp;&lt;code style=&quot;background-color: #f9f2f4; border-radius: 4px; box-sizing: border-box; color: #c7254e; padding: 2px 4px;&quot;&gt;{contactId}&lt;/code&gt;&amp;nbsp;with the numeric value you wrote down. It should return yet another JSON encoded response that includes street address information. This response for me also included the ID document information in the&amp;nbsp;&lt;code style=&quot;background-color: #f9f2f4; border-radius: 4px; box-sizing: border-box; color: #c7254e; padding: 2px 4px;&quot;&gt;documentType&lt;/code&gt;&amp;nbsp;and&amp;nbsp;&lt;code style=&quot;background-color: #f9f2f4; border-radius: 4px; box-sizing: border-box; color: #c7254e; padding: 2px 4px;&quot;&gt;documentNumber&lt;/code&gt;&amp;nbsp;fields, plus (worryingly) information that would seem to pertain to the expiration date of the document&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&amp;nbsp;&lt;br /&gt;It is vital to monitor for suspicious activity on your accounts and report any you see to the relevant provider. Be wary of any spam calls/texts/emails, even on social media, and never click on suspicious links.&lt;br /&gt;&amp;nbsp;&lt;br /&gt;Banks, government bodies, and other institutions make it a policy to never contact you over text, phone, or email asking for personal information. If you receive suspicious communications, do not hand out your details. You can contact the provider directly to follow up or check the ACCC&#39;s&amp;nbsp;&lt;a href=&quot;https://www.scamwatch.gov.au/&quot; style=&quot;color: #0086f0;&quot;&gt;Scamwatch&lt;/a&gt;&amp;nbsp;to see if similar frauds have occurred.&lt;br /&gt;&amp;nbsp;&lt;br /&gt;Optus has explicitly stated it will not be sending links in data breach emails, so if you receive an email from &quot;Optus&quot; with a &quot;click here for more details&quot; button, it&#39;s likely not from the telco. Although Optus advised the user password is not breached, As a precautionary measure there are proactive response actions we recommend that you may wish to consider:&lt;br /&gt;&amp;nbsp;&lt;/span&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Changing your Optus email and account passwords. Make sure you have strong passwords that you haven’t used for other accounts. (if you use same password as your Optus to the other accounts before make sure to change them).&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;When updating your internet banking passwords, go to the financial institution’s website directly by typing their web address into your web browser. Generally, a financial institution won’t ask you in an email to click on a link to update your password.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span&gt;&lt;span style=&quot;font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;Enable two-factor authentication on all your accounts, especially mobile banking or money management apps. This helps protect your data since hackers need more than just your password to access your account.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span&gt;&lt;span style=&quot;font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;You could also&amp;nbsp; make regular backups of your phone’s data to a secure hard drive.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Monitor your account transactions online or using paper account statements if you receive them. If you spot any purchases you didn’t make, report these immediately to your financial institution.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Place limits on your accounts or ask you bank how you can secure your money.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span&gt;&lt;span style=&quot;font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;If you suspect fraud you can request a ban on your credit report.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Change your Driver licence, Medicare and passport number if you received email from optus that your data is breached.&lt;/span&gt;&lt;/li&gt;&lt;/ol&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&amp;nbsp;&lt;br /&gt;If you require more info you can follow the guides below&lt;br /&gt;&amp;nbsp;&lt;br /&gt;&lt;a href=&quot;https://www.oaic.gov.au/__data/assets/pdf_file/0014/1409/oaic-what-to-do-if-there-is-a-data-breach.pdf&quot; style=&quot;color: #0086f0;&quot;&gt;What to do if there is a data breach (oaic.gov.au)&lt;br /&gt;&lt;/a&gt;Also consider the steps outlined in&amp;nbsp;&lt;a href=&quot;https://assets.website-files.com/5af4dc294c01df9fc297c900/632e67b2ca8ee2c0a1e7361b_IDCARE%20Response%20Fact%20Sheet%20-%20Optus%20Data%20Breach.pdf&quot; style=&quot;color: #0086f0;&quot;&gt;IDCARE Optus Data Breach Response Fact sheet.&lt;br /&gt;&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;p class=&quot;MsoListParagraph&quot; style=&quot;background-color: #141414; color: #e1e1e1; font-family: Calibri, sans-serif; font-size: 11pt; margin: 0cm 0cm 0.0001pt 36pt; text-align: left; text-indent: -18pt;&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.maximusit.net/feeds/5309875397754254348/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.maximusit.net/2022/09/optus-data-breach-what-to-do-if-you.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/5309875397754254348'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/5309875397754254348'/><link rel='alternate' type='text/html' href='http://www.maximusit.net/2022/09/optus-data-breach-what-to-do-if-you.html' title='Optus data breach: what to do if you think you&#39;re at risk'/><author><name>Faysal Hasan</name><uri>http://www.blogger.com/profile/11837891241239740342</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total><georss:featurename>Australia</georss:featurename><georss:point>-25.274398 133.775136</georss:point><georss:box>-53.584631836178843 98.618886 3.035835836178844 168.931386</georss:box></entry><entry><id>tag:blogger.com,1999:blog-8774245130267339525.post-1930007717968754488</id><published>2022-09-22T21:06:00.003+10:00</published><updated>2022-09-22T21:06:42.755+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><title type='text'>Optus Telecom company got hacked</title><content type='html'>&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWg79erRqRYIYSovTGigpURHQ6V0cPWtdmIF_BHw8kLtVe59Fxdg5fFebGg5A1XLLG-nKSkAIB9ChR8kCb5zXdtrnieXnSgBeP1pCVQwxiWfpBuao6NZ_pd5nvaJjdXl0e8gyG0-Gfsf5B7tMvpN1Vc70WUSMq5zCE8CIZfaSZqJV_C3EcQv2WHyc0Dw/s850/Optus%20hacked.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;547&quot; data-original-width=&quot;850&quot; height=&quot;206&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWg79erRqRYIYSovTGigpURHQ6V0cPWtdmIF_BHw8kLtVe59Fxdg5fFebGg5A1XLLG-nKSkAIB9ChR8kCb5zXdtrnieXnSgBeP1pCVQwxiWfpBuao6NZ_pd5nvaJjdXl0e8gyG0-Gfsf5B7tMvpN1Vc70WUSMq5zCE8CIZfaSZqJV_C3EcQv2WHyc0Dw/s320/Optus%20hacked.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot;&gt;Now our own &lt;b&gt;#Optus&lt;/b&gt;&amp;nbsp; got hacked.&lt;br /&gt;
&lt;b&gt;#optus&lt;/b&gt; is investigating the possible unauthorised access of current and former customers’ information.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Upon discovering this, Optus immediately shut down the attack. Optus is working with the Australian Cyber Security Centre to mitigate any risks to customers. Optus has also notified the Australian Federal Police, the Office of the Australian Information Commissioner and key regulators.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Up to 3 million users have had all their data stolen, including passport numbers and birth dates. Information which may have been exposed includes customers’ names, dates of birth, phone numbers, email addresses, and, for a subset of customers, addresses, ID document numbers such as driver&#39;s licence or passport numbers. &amp;nbsp;Payment detail and account passwords have not been compromised.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Optus &lt;b&gt;#services&lt;/b&gt;, including &lt;b&gt;#mobile&lt;/b&gt; and home &lt;b&gt;#internet&lt;/b&gt;, are not affected, and messages and voice calls have not been compromised. Optus services remain safe to use and operate as per normal.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Customers whos data that got hacked optus is yet to inform individual person.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;No technical details on how the hack occuer is not published yet.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt; &lt;b&gt;#cybersecurity&lt;/b&gt; &lt;b&gt;#police&lt;/b&gt; &lt;b&gt;#hacking&lt;/b&gt; &lt;b&gt;#acsc&lt;/b&gt; &lt;b&gt;#databreach&lt;/b&gt; &lt;b&gt;#cyberattack&lt;/b&gt; &lt;b&gt;#customerdata&lt;/b&gt; &lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.maximusit.net/feeds/1930007717968754488/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.maximusit.net/2022/09/optus-telecom-company-got-hacked.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/1930007717968754488'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/1930007717968754488'/><link rel='alternate' type='text/html' href='http://www.maximusit.net/2022/09/optus-telecom-company-got-hacked.html' title='Optus Telecom company got hacked'/><author><name>Faysal Hasan</name><uri>http://www.blogger.com/profile/11837891241239740342</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWg79erRqRYIYSovTGigpURHQ6V0cPWtdmIF_BHw8kLtVe59Fxdg5fFebGg5A1XLLG-nKSkAIB9ChR8kCb5zXdtrnieXnSgBeP1pCVQwxiWfpBuao6NZ_pd5nvaJjdXl0e8gyG0-Gfsf5B7tMvpN1Vc70WUSMq5zCE8CIZfaSZqJV_C3EcQv2WHyc0Dw/s72-c/Optus%20hacked.png" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>Melbourne VIC, Australia</georss:featurename><georss:point>-37.8136276 144.9630576</georss:point><georss:box>-66.123861436178842 109.80680760000001 -9.5033937638211512 -179.8806924</georss:box></entry><entry><id>tag:blogger.com,1999:blog-8774245130267339525.post-505908812926234781</id><published>2022-09-21T15:23:00.000+10:00</published><updated>2022-09-21T15:23:03.394+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Home based Business"/><title type='text'>Uber Got Hacked badly.</title><content type='html'>&lt;p&gt;&lt;b&gt;#Uber&lt;/b&gt; got hacked. The hack was successful because of&amp;nbsp; &lt;b&gt;#socialengineering&lt;/b&gt; so be carefull when you receive &lt;b&gt;#email&lt;/b&gt; or message check it out before clicking any link or giving away your login info etc.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Secondly change your Uber password, these are the two key takeway.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Now to the technical stuff,&amp;nbsp; The hacker claim they Social Engineered an employee then found admin credentials in a powershell script on a network share. As the hacker says&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;&quot;One of the powershell scripts contained the username and password for a admin user in Thycotic (PAM) Using this i was able to extract secrets for all services, DA, DUO, Onelogin, AWS, GSuite&quot;&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKl9qDd05_p61ZqBwwzwopyI-CyZgIKIlbwujhiz_fSGD8mZ_fRHtoHPIHfi0HEFkJQHdW9diYXl9URT_PR0FxBG_npQ63WIptFhTTnP0luJl-x47wjxy4tG-mTyUuIiDDP4BQ6LvDQ2SL4xnwGCYUGzFRS6a6aqIPsjwfWb1Y2VmVHwJzpzbhk8Bl3w/s1280/20220918_013550.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;686&quot; data-original-width=&quot;1280&quot; height=&quot;172&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKl9qDd05_p61ZqBwwzwopyI-CyZgIKIlbwujhiz_fSGD8mZ_fRHtoHPIHfi0HEFkJQHdW9diYXl9URT_PR0FxBG_npQ63WIptFhTTnP0luJl-x47wjxy4tG-mTyUuIiDDP4BQ6LvDQ2SL4xnwGCYUGzFRS6a6aqIPsjwfWb1Y2VmVHwJzpzbhk8Bl3w/s320/20220918_013550.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRBiungD0oDsKQjKZK16Xbxyd1IdfEcHp5ot3y5IIKTPLPRJeKiID6-xT7qd2qbe7Q9Gg0DOX6n4yC6r0npP8RWhOMT24Qb5aJRE7lYHn1vnedW3qeVv5At8iwXdh8bJij1CBLtThQIe-_6FwpU6KbzkREd_i6Dw3rYc6-iFiTtBan5wT_10gdkx7XgQ/s960/20220918_013701.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;291&quot; data-original-width=&quot;960&quot; height=&quot;97&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRBiungD0oDsKQjKZK16Xbxyd1IdfEcHp5ot3y5IIKTPLPRJeKiID6-xT7qd2qbe7Q9Gg0DOX6n4yC6r0npP8RWhOMT24Qb5aJRE7lYHn1vnedW3qeVv5At8iwXdh8bJij1CBLtThQIe-_6FwpU6KbzkREd_i6Dw3rYc6-iFiTtBan5wT_10gdkx7XgQ/s320/20220918_013701.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5EWcpTcHn4dXEua0hhwgUSkRwNF_bwth4Q73OUuTevEJPwP65iXCCxRmrjIXnAZ9FATx264znUzksXsRr-jyX_-vkHM8J2g5pVZ9d1uwOH72Dr4_fM5LPQidxIzx8i7iDtLR6-1Q0grYNyI_mOBaNjtU6IFmBTUhMsct_QPVzIYS9J7rZDx49pbh9mQ/s781/20220918_013939.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;781&quot; data-original-width=&quot;671&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5EWcpTcHn4dXEua0hhwgUSkRwNF_bwth4Q73OUuTevEJPwP65iXCCxRmrjIXnAZ9FATx264znUzksXsRr-jyX_-vkHM8J2g5pVZ9d1uwOH72Dr4_fM5LPQidxIzx8i7iDtLR6-1Q0grYNyI_mOBaNjtU6IFmBTUhMsct_QPVzIYS9J7rZDx49pbh9mQ/s320/20220918_013939.jpg&quot; width=&quot;275&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcgAeDqK7-VUZgKVMnjR47wz9pJ8pOxr9OzHy_uZDJKZmRrcHQxpEOldFLybV-AWMokX4okQn5A3JKZW9va3H8tHHqxK0WipKr_rWQoB-Xg5TQ1qvSrAdce_tbu0gFr3pPztLlWxbL61y9EGxp8hOmYZNmYKsqwu-NkFpXSnotTTLWE0sxjOz_fWSa2Q/s1280/Fcvh_tEXkAMsCN4.jpeg.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;686&quot; data-original-width=&quot;1280&quot; height=&quot;172&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcgAeDqK7-VUZgKVMnjR47wz9pJ8pOxr9OzHy_uZDJKZmRrcHQxpEOldFLybV-AWMokX4okQn5A3JKZW9va3H8tHHqxK0WipKr_rWQoB-Xg5TQ1qvSrAdce_tbu0gFr3pPztLlWxbL61y9EGxp8hOmYZNmYKsqwu-NkFpXSnotTTLWE0sxjOz_fWSa2Q/s320/Fcvh_tEXkAMsCN4.jpeg.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuAiMmyzVALzufY7EWLfAjk7lfvcvx2AaQMuqp_jNhA1gfcos9ENZbYb0Gbk-akAHGjkklK_m1FBsmC_ES1J6Ar3UG48E8fv5haAB0VrKErYxvSsF754FHMVDQGzKe1Z-zuEmlvRWLRLYNukyfh2Nh3ky4U5V7-Xfg_VTfejiMd-CBFEwhAjPygA76Sw/s1280/FcviAMrXgAUOF5u.jpeg.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;686&quot; data-original-width=&quot;1280&quot; height=&quot;172&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuAiMmyzVALzufY7EWLfAjk7lfvcvx2AaQMuqp_jNhA1gfcos9ENZbYb0Gbk-akAHGjkklK_m1FBsmC_ES1J6Ar3UG48E8fv5haAB0VrKErYxvSsF754FHMVDQGzKe1Z-zuEmlvRWLRLYNukyfh2Nh3ky4U5V7-Xfg_VTfejiMd-CBFEwhAjPygA76Sw/s320/FcviAMrXgAUOF5u.jpeg.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p dir=&quot;ltr&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot;&gt;Attacker basically got access to almost everything (allegedly)&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;- Slack&lt;br /&gt;
- Google Workspace Admin&lt;br /&gt;
- AWS Accounts&lt;br /&gt;
- HackerOne Admin&lt;br /&gt;
- SentinelOne EDR&lt;br /&gt;
- vSphere&lt;br /&gt;
- Financial Dashboards&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Don’t point and laugh. It could be you next time. Focus on your IT security and employee training on Social Engineering.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot;&gt;** Also another key point if you capable speand and invest in people early not after the breach as we seen so many cases&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJ9LjCOGORFqUPqaqfM5z_dWUKCEPf4XwyT-Gah5L8Lkg1kEnPd4W3MAqgOKWi2bRllgFEuwrP-LiiW-zoAwK8nvVWMnfAsY0gRjc-Y8h_UYSc_dI-8UDi1bQVWB24NVU9NCmRkCNO-jRaOfzXT6QG24xhlXfCmkuRbn3pcOLf7tzR5F0metY48ANBoQ/s852/tmp_fdb3ce43-13dc-440f-bba1-3e442dc1b28d.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;852&quot; data-original-width=&quot;540&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJ9LjCOGORFqUPqaqfM5z_dWUKCEPf4XwyT-Gah5L8Lkg1kEnPd4W3MAqgOKWi2bRllgFEuwrP-LiiW-zoAwK8nvVWMnfAsY0gRjc-Y8h_UYSc_dI-8UDi1bQVWB24NVU9NCmRkCNO-jRaOfzXT6QG24xhlXfCmkuRbn3pcOLf7tzR5F0metY48ANBoQ/s320/tmp_fdb3ce43-13dc-440f-bba1-3e442dc1b28d.png&quot; width=&quot;203&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p dir=&quot;ltr&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot;&gt;Good Luck.&lt;/p&gt;&lt;p dir=&quot;ltr&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p dir=&quot;ltr&quot;&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt; &lt;b&gt;#hacked&lt;/b&gt; &lt;b&gt;#hacker&lt;/b&gt; &lt;b&gt;#password&lt;/b&gt; &lt;b&gt;#credentials&lt;/b&gt; &lt;b&gt;#user&lt;/b&gt; &lt;b&gt;#powershell&lt;/b&gt; &lt;b&gt;#aws&lt;/b&gt; &lt;b&gt;#share&lt;/b&gt; &lt;b&gt;#uber&lt;/b&gt; &lt;b&gt;#vsphere&lt;/b&gt; &lt;b&gt;#slack&lt;/b&gt; &lt;b&gt;#gsuite&lt;/b&gt; &lt;b&gt;#sentinelone&lt;/b&gt; &lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.maximusit.net/feeds/505908812926234781/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.maximusit.net/2022/09/uber-got-hacked-badly.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/505908812926234781'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/505908812926234781'/><link rel='alternate' type='text/html' href='http://www.maximusit.net/2022/09/uber-got-hacked-badly.html' title='Uber Got Hacked badly.'/><author><name>Faysal Hasan</name><uri>http://www.blogger.com/profile/11837891241239740342</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKl9qDd05_p61ZqBwwzwopyI-CyZgIKIlbwujhiz_fSGD8mZ_fRHtoHPIHfi0HEFkJQHdW9diYXl9URT_PR0FxBG_npQ63WIptFhTTnP0luJl-x47wjxy4tG-mTyUuIiDDP4BQ6LvDQ2SL4xnwGCYUGzFRS6a6aqIPsjwfWb1Y2VmVHwJzpzbhk8Bl3w/s72-c/20220918_013550.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8774245130267339525.post-3333192102885838219</id><published>2022-09-19T12:31:00.001+10:00</published><updated>2022-09-19T12:31:25.174+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><title type='text'>Evil PLC Attack: Using a Controller as Predator Rather than Prey</title><content type='html'>&lt;p&gt;Team82 has developed a novel attack that weaponizes programmable logic controllers (PLCs) in order to exploit engineering workstations and further invade &lt;b&gt;#OT&lt;/b&gt; and enterprise networks. They’re calling this the Evil &lt;b&gt;#PLC&lt;/b&gt; Attack.&amp;nbsp;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAuZ89ftf4TB7CITaTDJei7uC_x4xGjwD66yyjTiY5J8kAI2YFqMEsXW94gfXS3Ygnn0wl3KVk1iH2lLRU2DqCb2qjeIdX9p8-meXBFqb4H2hQyhfvfVj5cSMWEI3D9eDw18GvVOYd2mn09t0gkDZtqv9VdeEDG1C8llG_Xp07l9wMyZ3hgu6Eu6qTnA/s1072/Evil%20PLC%20attack.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;674&quot; data-original-width=&quot;1072&quot; height=&quot;201&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAuZ89ftf4TB7CITaTDJei7uC_x4xGjwD66yyjTiY5J8kAI2YFqMEsXW94gfXS3Ygnn0wl3KVk1iH2lLRU2DqCb2qjeIdX9p8-meXBFqb4H2hQyhfvfVj5cSMWEI3D9eDw18GvVOYd2mn09t0gkDZtqv9VdeEDG1C8llG_Xp07l9wMyZ3hgu6Eu6qTnA/s320/Evil%20PLC%20attack.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;The attack targets engineers working every day on industrial networks, configuring and troubleshooting #PLCs to ensure the safety and reliability of processes across critical industries such as utilities, electricity, water and wastewater, heavy industry, manufacturing, and automotive, among others.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;The Evil &lt;b&gt;#plc&lt;/b&gt;&amp;nbsp; Attack research resulted in working proof-of-concept exploits against seven market-leading automation companies, including&amp;nbsp;Rockwell Automation,&amp;nbsp;Schneider Electric,&amp;nbsp;GE,&amp;nbsp;B&amp;amp;R,&amp;nbsp;XINJE,&amp;nbsp;OVARRO, and&amp;nbsp;Emerson.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;The Evil PLC Attack turns the PLCs into the tool rather than the target. By weaponizing one PLC, an attacker may in turn compromise the engineer’s workstation, which is the best source for process-related information and would have access to all the other PLCs on the network. With this access and information, the attacker can easily alter the logic on any PLC.&amp;nbsp;&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;The trick would be to lure an engineer to connect to a compromised PLC; the quickest way is to cause a fault on the PLC. That is a typical scenario an engineer would respond to, and connect using their engineering workstation application as a troubleshooting tool.&amp;nbsp;&lt;br /&gt;&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Full report here&amp;nbsp;https://claroty.com/team82/blog/evil-plc-attack-using-a-controller-as-predator-rather-than-prey&lt;a href=&quot;https://claroty.com/team82/blog/evil-plc-attack-using-a-controller-as-predator-rather-than-prey&quot;&gt;https://claroty.com/team82/blog/evil-plc-attack-using-a-controller-as-predator-rather-than-prey&lt;/a&gt;&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;&lt;b&gt;#plcprogramming&lt;/b&gt; &lt;b&gt;#plcscada&lt;/b&gt; &lt;b&gt;#otsecurity&lt;/b&gt; &lt;b&gt;#cyber&lt;/b&gt; &lt;b&gt;#scada&lt;/b&gt; &lt;b&gt;#ot&lt;/b&gt; &lt;b&gt;#itsecurity&lt;/b&gt;&amp;nbsp; &lt;b&gt;#cybersecurity&lt;/b&gt; &lt;b&gt;#redteam&lt;/b&gt; &lt;b&gt;#pentest&lt;/b&gt; &lt;b&gt;#pentesting&lt;/b&gt; &lt;b&gt;#hacking&lt;/b&gt; &lt;b&gt;#hackers&lt;/b&gt; &lt;b&gt;#coding&lt;/b&gt;&amp;nbsp;&amp;nbsp; &lt;b&gt;#malware&lt;/b&gt;&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;&lt;b&gt;#utilities&lt;/b&gt; &lt;b&gt;#electricity&lt;/b&gt; &lt;b&gt;#water&lt;/b&gt;&amp;nbsp; &lt;b&gt;#wastewater&lt;/b&gt; &lt;b&gt;#heavyindustry&lt;/b&gt; &lt;b&gt;#manufacturing&lt;/b&gt; &lt;b&gt;#automotive&lt;/b&gt;&lt;br /&gt;
&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.maximusit.net/feeds/3333192102885838219/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.maximusit.net/2022/09/evil-plc-attack-using-controller-as.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/3333192102885838219'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/3333192102885838219'/><link rel='alternate' type='text/html' href='http://www.maximusit.net/2022/09/evil-plc-attack-using-controller-as.html' title='Evil PLC Attack: Using a Controller as Predator Rather than Prey'/><author><name>Faysal Hasan</name><uri>http://www.blogger.com/profile/11837891241239740342</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAuZ89ftf4TB7CITaTDJei7uC_x4xGjwD66yyjTiY5J8kAI2YFqMEsXW94gfXS3Ygnn0wl3KVk1iH2lLRU2DqCb2qjeIdX9p8-meXBFqb4H2hQyhfvfVj5cSMWEI3D9eDw18GvVOYd2mn09t0gkDZtqv9VdeEDG1C8llG_Xp07l9wMyZ3hgu6Eu6qTnA/s72-c/Evil%20PLC%20attack.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8774245130267339525.post-2018238941062089833</id><published>2022-07-23T00:32:00.001+10:00</published><updated>2022-11-10T01:29:52.720+11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Programming"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Teamwork"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="viruses"/><title type='text'>Google Hacking :-</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0cm 0cm 10pt;&quot;&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color: red;&quot;&gt;Basic Operators:-&lt;/span&gt;&lt;/strong&gt; &lt;br /&gt;
&lt;strong&gt;&lt;span style=&quot;color: #3d85c6;&quot;&gt;1) And (+) :-&lt;/span&gt;&lt;/strong&gt; This operator is used to include multiple terms in a query which is to be searched in google.&lt;br /&gt;
example:- if we type &quot;hacker+yahoo+science&quot; in google search box and click search, it will reveal the results something which are related to all the three words simultaneously i.e. hacker, yahoo and science.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;&lt;span style=&quot;color: #3d85c6;&quot;&gt;2 ) OR (|) :-&lt;/span&gt;&lt;/strong&gt; The OR operator, represented by symbol( | ) or simply the word OR in uppercase letters, instructs google to locate either one term or another term in a query.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;&lt;span style=&quot;color: #3d85c6;&quot;&gt;3) NOT :-&lt;/span&gt;&lt;/strong&gt; It is opposite of AND operator, a NOT operator excludes a word from search.&lt;br /&gt;
example:- If we want to search websites containing the terms google and hacking but not security then we enter the query like &quot;google+hacking&quot; NOT &quot;security&quot;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;
&lt;strong&gt;&lt;span style=&quot;color: red;&quot;&gt;Advanced Operators:-&lt;/span&gt;&lt;/strong&gt; &lt;br /&gt;
&lt;strong&gt;&lt;span style=&quot;color: #3d85c6;&quot;&gt;1) Intitle :-&lt;/span&gt;&lt;/strong&gt; This operator searches within the title tags.&lt;br /&gt;
examples:- intitle:hacking returns all pages that have the string &quot;hacking&quot; in their title.&lt;br /&gt;
&lt;br /&gt;
intitle:&quot;index of&quot; returns all pages that have string &quot;index of&quot; in their title.&lt;br /&gt;
&lt;br /&gt;
Companion operator:- &quot;allintitle&quot;.&lt;br /&gt;
&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;
&lt;strong&gt;&lt;span style=&quot;color: #3d85c6;&quot;&gt;2) Inurl :-&lt;/span&gt;&lt;/strong&gt; Returns all matches, where url of the pages contains given word.&lt;br /&gt;
example:- inurl:admin returns all matches, where url of searched pages must contains the word &quot;admin&quot;.&lt;br /&gt;
&lt;br /&gt;
Companion operator:- &quot;allinurl&quot;.&lt;br style=&quot;mso-special-character: line-break;&quot; /&gt;&lt;/span&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXNJolo1YFHr0rGLgs4Pv9HV9CdzBHBr-ecJ9q80koEhnyM6gq7YyO3QMRPgSL-n7nT-keS19r6LdYfFUVLSEPhNz86ztfMRN2fpB-1vP_2fZbObb3UqQdpphZFkysdJCyElCCRvsgZmSQRtpauZ25uRxMtNSD7aNSl-GxnkN6ydZ0OBZXObZ6guZuIQ/s2018/Google%20dork%20search%20.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;2018&quot; data-original-width=&quot;1054&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXNJolo1YFHr0rGLgs4Pv9HV9CdzBHBr-ecJ9q80koEhnyM6gq7YyO3QMRPgSL-n7nT-keS19r6LdYfFUVLSEPhNz86ztfMRN2fpB-1vP_2fZbObb3UqQdpphZFkysdJCyElCCRvsgZmSQRtpauZ25uRxMtNSD7aNSl-GxnkN6ydZ0OBZXObZ6guZuIQ/s320/Google%20dork%20search%20.jpg&quot; width=&quot;167&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color: #3d85c6;&quot;&gt;3) Site :-&lt;/span&gt;&lt;/strong&gt; This operator narrows search to specific website. It will search results only from given domain. Can be used to carry out information gathering on specific domain.&lt;br /&gt;
example:- site:www.microsoft.com will find results only from the domain www.microsoft.com&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;&lt;span style=&quot;color: #3d85c6;&quot;&gt;4) Link :-&lt;/span&gt;&lt;/strong&gt; This operator allows you to search for pages that links to given website.&lt;br /&gt;
example:- link:www.microsoft.com&lt;br /&gt;
Here, each of the searched result contains asp links to &lt;a href=&quot;http://www.microsoft.com/&quot;&gt;www.microsoft.com&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;&lt;span style=&quot;color: #3d85c6;&quot;&gt;5) Info :-&lt;/span&gt;&lt;/strong&gt; This operator shows summary information for a site and provides links to other google searches that might pertain to that site.&lt;br /&gt;
example:- info:www.yahoo.com&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;&lt;span style=&quot;color: #3d85c6;&quot;&gt;6) Define :-&lt;/span&gt;&lt;/strong&gt; This operator shows definition for any term.&lt;br /&gt;
example:- define:security&lt;br /&gt;
It gives various definitions for the word &quot;security&quot; in different manner from all over the world.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;&lt;span style=&quot;color: #3d85c6;&quot;&gt;7) Filetype :-&lt;/span&gt;&lt;/strong&gt; This operator allows us to search specific files on the internet. The supported file types can be pdf, xls, ppt, doc, txt, asp, swf, rtf, etc..&lt;br /&gt;
example:- If you want to search for all text documents presented on domain www.microsoft.com then we enter the query something like following.&lt;br /&gt;
&quot;inurl:www.microsoft.com filetype:txt&quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;&lt;span style=&quot;color: red;&quot;&gt;POPULAR SEARCH:&lt;/span&gt;&lt;/strong&gt; &lt;br /&gt;
&lt;strong&gt;&lt;span style=&quot;color: #3d85c6;&quot;&gt;Google Search :- &quot;Active Webcam Page&quot; inurl:8080&lt;/span&gt;&lt;/strong&gt; Description- Active WebCam is a shareware program for capturing and sharing the video streams from a lot of video devices. Known bugs: directory traversal and cross site scripting.&lt;br style=&quot;mso-special-character: line-break;&quot; /&gt; &lt;br style=&quot;mso-special-character: line-break;&quot; /&gt; &lt;/span&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color: #3d85c6;&quot;&gt;Google Search :- &quot;delete entries&quot; inurl:admin/delete.asp&lt;/span&gt;&lt;/strong&gt; Description- AspJar contains a flaw that may allow a malicious user to delete arbitrary messages. The issue is triggered when the authentication method is bypassed and /admin/delete.asp is accessed directly. It is possible that the flaw may allow a malicious user to delete messages resulting in a loss of integrity.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;&lt;span style=&quot;color: #3d85c6;&quot;&gt;Google Search :- &quot;phone * * *&quot; &quot;address *&quot; &quot;e-mail&quot; intitle:&quot;curriculum vitae&quot;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;
Description- This search gives hundreds of existing curriculum vitae with names and address. An attacker could steal identity if there is an SSN in the document.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;&lt;span style=&quot;color: #3d85c6;&quot;&gt;Google Search :- intitle:&quot;index of&quot; finance.xls&lt;/span&gt;&lt;/strong&gt; Description- Secret financial spreadsheets &#39;finance.xls&#39; or &#39;finances.xls&#39; of companies may revealed by this query.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;&lt;span style=&quot;color: #3d85c6;&quot;&gt;Google Search :- intitle:&quot;index.of&quot; robots.txt&lt;/span&gt;&lt;/strong&gt; Description- The robots.txt file contains &quot;rules&quot; about where web spiders are allowed (and NOT allowed) to look in a website&#39;s directory structure. Without over-complicating things, this means that the robots.txt file gives a mini-roadmap of what&#39;s somewhat public and what&#39;s considered more private on a web site. Have a look at the robots.txt file itself, it contains interesting stuff. However, don&#39;t forget to check out the other files in these directories since they are usually at the top directory level of the web server!&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;&lt;span style=&quot;color: #3d85c6;&quot;&gt;Google Search :- intitle:index.of.admin&lt;/span&gt;&lt;/strong&gt; Description- Locate &quot;admin&quot; directories that are accessible from directory listings.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;&lt;span style=&quot;color: #3d85c6;&quot;&gt;Google Search :- inurl:&quot;nph-proxy.cgi&quot; &quot;start browsing&quot;&lt;/span&gt;&lt;/strong&gt; Description- Returns lots of proxy servers that protects your identity online.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.maximusit.net/feeds/2018238941062089833/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.maximusit.net/2012/01/google-hacking.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/2018238941062089833'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/2018238941062089833'/><link rel='alternate' type='text/html' href='http://www.maximusit.net/2012/01/google-hacking.html' title='Google Hacking :-'/><author><name>Faysal Hasan</name><uri>http://www.blogger.com/profile/11837891241239740342</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXNJolo1YFHr0rGLgs4Pv9HV9CdzBHBr-ecJ9q80koEhnyM6gq7YyO3QMRPgSL-n7nT-keS19r6LdYfFUVLSEPhNz86ztfMRN2fpB-1vP_2fZbObb3UqQdpphZFkysdJCyElCCRvsgZmSQRtpauZ25uRxMtNSD7aNSl-GxnkN6ydZ0OBZXObZ6guZuIQ/s72-c/Google%20dork%20search%20.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8774245130267339525.post-1045116256209609489</id><published>2022-06-19T02:54:00.005+10:00</published><updated>2022-06-19T02:54:49.635+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><title type='text'>DNS Logs Anomaly Hunting Checklist for Security and SOC Analyst</title><content type='html'>&lt;p&gt;&amp;nbsp;

&lt;/p&gt;&lt;h2 lang=&quot;en-US&quot; style=&quot;font-family: Calibri; font-size: 11pt; margin: 0in; text-align: left;&quot;&gt;&lt;span style=&quot;background-color: #ffa400;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;DNS Logs Anomaly Hunting Checklist for SOC Analyst &lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p lang=&quot;en-US&quot; style=&quot;font-family: Calibri; font-size: 11.0pt; margin: 0in;&quot;&gt;&amp;nbsp;&lt;/p&gt;

&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifUMaka5r1pyHs-GpS5h0qlpVKMtX6VgFzGbo0KWsOTLccEEquUzQALkBQKRn-GwlFfAVSwaRzDMrPDOEP0idrZZqr5xX3UK7lsVZHvV_8pNLI5b-Cos15lIvVYebxSs_FAAIcsq74wdM4gaj7E-2Ppof1bQ35UTRxDRfoIdHx_wtllerOpL_eHFb94g/s751/DNS%20log.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;557&quot; data-original-width=&quot;751&quot; height=&quot;296&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifUMaka5r1pyHs-GpS5h0qlpVKMtX6VgFzGbo0KWsOTLccEEquUzQALkBQKRn-GwlFfAVSwaRzDMrPDOEP0idrZZqr5xX3UK7lsVZHvV_8pNLI5b-Cos15lIvVYebxSs_FAAIcsq74wdM4gaj7E-2Ppof1bQ35UTRxDRfoIdHx_wtllerOpL_eHFb94g/w400-h296/DNS%20log.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;• &lt;/span&gt;Check for the hosts with a
high volume of uncommon record types (TXT, NULL, CNAME,&amp;nbsp;etc.)&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;

&lt;/span&gt;&lt;/span&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;• Command and control channels may utilize specific DNS records such
as ( TXT and CNAME requests ) to execute malware.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;

&lt;/span&gt;&lt;/span&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;• Explore Top Level Domains,&amp;nbsp;TLDs&amp;nbsp;(.xyz, .me, .biz, etc ),
and TLDs for geographical regions in which your organization does not regularly
operate.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;

&lt;/span&gt;&lt;/span&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;• The proliferation of TLDs has made it easier for attackers to
continually add new domains to their infrastructure to evade threat intel
lists, as well as register&amp;nbsp;doppelganger&amp;nbsp;domains for common websites.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;

&lt;/span&gt;&lt;/span&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;• Inbound/ Outbound Requests for TLDs of geographical regions
outside of your organization’s point of presence should be considered
suspicious and reviewed, especially regions synonymous
with&amp;nbsp;cybercrime&amp;nbsp;and&amp;nbsp;anonymization.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;

&lt;/span&gt;&lt;/span&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;• Aggregate and Filter on DNS application logs with the response
code&amp;nbsp;NXDOMAIN&amp;nbsp;(domain does not exist) to review hosts seen with a
high volume of&amp;nbsp;DNS resolution failures.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;

&lt;/span&gt;&lt;/span&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;• There are many benign reasons for failed DNS queries; however, the
abnormal volume can be a strong indicator of possible threat activity.&amp;nbsp;For
example, malware utilizing&amp;nbsp;Domain generation algorithms&amp;nbsp;( DGAs ) will
cycle through multiple generated domains until a valid reply is received. Since
most of the domains requested will not exist, it will generate a high volume of
NXDOMAIN responses. In addition, abnormal NXDOMAIN volume could highlight hosts
requesting malicious domains that are no longer active.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;

&lt;/span&gt;&lt;/span&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;• Look for hosts with high DNS request volume for multiple
subdomains of a single parent domain.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;

&lt;/span&gt;&lt;/span&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;• A common method of communicating data is by including it in the
query string itself in place of the subdomain (commonly encoded using Base64).
Identifying requests of multiple suspicious subdomains for a specific domain
could help to highlight this method of communication.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;

&lt;/span&gt;&lt;/span&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;• Identify suspicious requests by reviewing queries of domains that
are abnormally&amp;nbsp;long, or domains with a high level of entropy.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;

&lt;/span&gt;&lt;/span&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;• Hunting abnormal long queries with a high amount could help
identify&amp;nbsp;encoded&amp;nbsp;data hidden in query strings as well as evidence of
DGA domains.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;

&lt;/span&gt;&lt;/span&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;• Review endpoints process names for any unusually named processes
or processes that are not regularly seen generating logon requests.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;

&lt;/span&gt;&lt;/span&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;• Attackers can simply register new domains to evade detection by
threat intel lists. Identifying newly registered domains could help to easily
identify suspicious activity.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;

&lt;/span&gt;&lt;/span&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;• DNS fluxing is a technique used by attackers to hide an
actual&amp;nbsp;phishing&amp;nbsp;or malware domain behind constantly changing
compromised hosts (IP) which are acting as proxies. To accomplish this, the
Time to Live (TTL) for DNS is set very low (close to 5 min) so that the changes
made in DNS will reflect quickly over the internet. Because it is constantly
changing, this makes it hard to identify, and take down the actual source.DNS
query for a domain, having a TTL less than 5-10 mins, should be one way to
hunt. Then getting different IP addresses for the same domain is also a way to
hunt.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;

&lt;/span&gt;&lt;/span&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;• Allowed Traffic on Port 53 Inbound Transition Control Protocol
(TCP), zone transfer and should only be allowed between primary and secondary
DNS servers. If zone transfer happens with an external IP/Domain which is
considered as a high alert.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;

&lt;/span&gt;&lt;/span&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;• DNS Should Not Query Unusual Destinations, this often indicates
the potentially malicious traffic.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

</content><link rel='replies' type='application/atom+xml' href='http://www.maximusit.net/feeds/1045116256209609489/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.maximusit.net/2022/06/dns-logs-anomaly-hunting-checklist-for.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/1045116256209609489'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/1045116256209609489'/><link rel='alternate' type='text/html' href='http://www.maximusit.net/2022/06/dns-logs-anomaly-hunting-checklist-for.html' title='DNS Logs Anomaly Hunting Checklist for Security and SOC Analyst'/><author><name>Faysal Hasan</name><uri>http://www.blogger.com/profile/11837891241239740342</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifUMaka5r1pyHs-GpS5h0qlpVKMtX6VgFzGbo0KWsOTLccEEquUzQALkBQKRn-GwlFfAVSwaRzDMrPDOEP0idrZZqr5xX3UK7lsVZHvV_8pNLI5b-Cos15lIvVYebxSs_FAAIcsq74wdM4gaj7E-2Ppof1bQ35UTRxDRfoIdHx_wtllerOpL_eHFb94g/s72-w400-h296-c/DNS%20log.png" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8774245130267339525.post-4334774232706481498</id><published>2022-06-19T02:48:00.003+10:00</published><updated>2022-06-22T00:43:37.360+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><title type='text'>Kerberoasting Attack and Detection</title><content type='html'>&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;/p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;

&lt;/span&gt;&lt;/span&gt;&lt;h2 lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in; text-align: left;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;background-color: #ffa400;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Kerberoasting&lt;/span&gt;&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in; text-align: left;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;is a common
attack used by malicious actors once access is gained to a organization&#39;s
internal network and a domain account is compromised. Kerberoasting allows an
attacker to elevate their privileges by gaining access to passwords for service
accounts on the domain.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgM9uBAQadPAw2BkBDNuZIbNqlQZ9dvz-GvJ01dh3WqbDX8ldbZGZQYkLgbwMR9bgPnTvitoljRRHhdQx-PEbBMEOC5j7T7F9j3IcUoq8RqQTc9GCHnRvkZEmntgODCFn_2_t2nhwxYN4Qzh5froGEe4Vp0wuNMvrA53VmV6f8TgLfv-LP44Nc9XjZjWQ/s1197/kerbaroasting.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;597&quot; data-original-width=&quot;1197&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgM9uBAQadPAw2BkBDNuZIbNqlQZ9dvz-GvJ01dh3WqbDX8ldbZGZQYkLgbwMR9bgPnTvitoljRRHhdQx-PEbBMEOC5j7T7F9j3IcUoq8RqQTc9GCHnRvkZEmntgODCFn_2_t2nhwxYN4Qzh5froGEe4Vp0wuNMvrA53VmV6f8TgLfv-LP44Nc9XjZjWQ/w400-h200/kerbaroasting.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;

&lt;/span&gt;&lt;/span&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;

&lt;/span&gt;&lt;/span&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;background-color: #ffa400;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Key Points &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;

&lt;/span&gt;&lt;/span&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;• Using Kerberoasting&lt;span&gt;&amp;nbsp;
&lt;/span&gt;attacker extracts service account credential hashes from Active
Directory for offline cracking by exploiting a combination of weak encryption
and poor service account password.&lt;span&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Kerberoasting is effective because an attacker does not require domain
administrator credentials to pull off this attack and can extract service
account credential hashes without sending packets to the target. &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;

&lt;/span&gt;&lt;/span&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;

&lt;/span&gt;&lt;/span&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;background-color: #ffa400;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Detecting Kerbaroasting: &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;

&lt;/span&gt;&lt;/span&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Event ID: 4768 (Kerberos TGS Request) The Account Domain field is
DOMAIN FQDN when it should be DOMAIN.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;

&lt;/span&gt;&lt;/span&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Event ID “4769” with the vulnerable encryption RC4 “0x17” and “0x18”
types in Kerberoasting and ticket option 0x40810000.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;

&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;background-color: #ffa400;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Elements of a Kerberoasting Attack&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Here is how a Kerberoasting attack works in practice:&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul style=&quot;direction: ltr; margin-bottom: 0in; margin-left: 0.75in; margin-top: 0in; unicode-bidi: embed;&quot; type=&quot;disc&quot;&gt;&lt;li lang=&quot;en-US&quot; style=&quot;margin-bottom: 0px; margin-top: 0px; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span&gt;To begin with, an attacker compromises
     the account of a domain user. The user need not have elevated or
     “administrator” privileges. The attacker authenticates to the domain.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;ul style=&quot;direction: ltr; margin-bottom: 0in; margin-left: 0.75in; margin-top: 0in; unicode-bidi: embed;&quot; type=&quot;disc&quot;&gt;&lt;li lang=&quot;en-US&quot; style=&quot;margin-bottom: 0px; margin-top: 0px; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span&gt;When the malicious&lt;span&gt;&amp;nbsp; &lt;/span&gt;user is authenticated, they receive a
     ticket granting ticket (TGT) from the Kerberos key distribution center
     (KDC) that is signed by its KRBTGT service account in Active Directory.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;ul style=&quot;direction: ltr; margin-bottom: 0in; margin-left: 0.75in; margin-top: 0in; unicode-bidi: embed;&quot; type=&quot;disc&quot;&gt;&lt;li lang=&quot;en-US&quot; style=&quot;margin-bottom: 0px; margin-top: 0px; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span&gt;Next, the malicious actor requests a
     service ticket for the service they wish to compromise. The domain
     controller will retrieve the permissions out of the Active Directory
     database and create a TGS ticket, encrypting it with the service’s
     password. As a result, only the service and the domain controller are
     capable of decrypting the ticket since those are the only two entities who
     share the secret.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;ul style=&quot;direction: ltr; margin-bottom: 0in; margin-left: 0.75in; margin-top: 0in; unicode-bidi: embed;&quot; type=&quot;disc&quot;&gt;&lt;li lang=&quot;en-US&quot; style=&quot;margin-bottom: 0px; margin-top: 0px; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span&gt;The domain controller provides the
     user with the service ticket that is then presented to the service, which
     will decrypt it and determine whether the user has been granted permission
     to access the service. At this point, an attacker may extract the ticket
     from system memory, and crack it offline.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;ul style=&quot;direction: ltr; margin-bottom: 0in; margin-left: 0.75in; margin-top: 0in; unicode-bidi: embed;&quot; type=&quot;disc&quot;&gt;&lt;li lang=&quot;en-US&quot; style=&quot;margin-bottom: 0px; margin-top: 0px; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span&gt;For password cracking, tools such as
     Impacket, PowerSploit and Empire contain features that automate the
     process: requesting service tickets and returning crackable ticket hashes
     in formats suitable for submission to cracking tools such as John the
     Ripper and Hashcat, which will pry plaintext credentials from vulnerable
     hashes.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;

&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&amp;nbsp;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQf2J3vXekFiK10rGYdkoW-TZVi6nxT86KS6q-McT0yS8AxMTX04tcXK2CqK1MXpHbO66N50AEq4Y36H4riZ9UgNM5spg8ypMv9-n0TtwIK6EIwvCPINCk_Vi2GFb4rh-hilWlF0ub60Ds6WL5gB-PKKbOO1rbSYiNkEDAA0Dkkphzw2ZKZ39UGW90uQ/s989/Karbaroasting.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;652&quot; data-original-width=&quot;989&quot; height=&quot;264&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQf2J3vXekFiK10rGYdkoW-TZVi6nxT86KS6q-McT0yS8AxMTX04tcXK2CqK1MXpHbO66N50AEq4Y36H4riZ9UgNM5spg8ypMv9-n0TtwIK6EIwvCPINCk_Vi2GFb4rh-hilWlF0ub60Ds6WL5gB-PKKbOO1rbSYiNkEDAA0Dkkphzw2ZKZ39UGW90uQ/w400-h264/Karbaroasting.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p lang=&quot;en-US&quot; style=&quot;margin-bottom: 0in; margin-right: 0in; margin-top: 0in; text-align: left;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;background-color: #ffa400;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Finding Golden and
Silver Tickets&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;background-color: #ffa400;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;background-color: #ffa400;&quot;&gt;

&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;Purpose: &lt;/b&gt;Identify
suspicious TGT (Golden) and TGS (Silver) tickets by comparing the MaxTicketAge
from the domain policy to the difference in the StartTime and EndTime of the
cached authentication ticket.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;

&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;Data
Required :&lt;/b&gt;&lt;b&gt; &lt;/b&gt;Remote
Access to collect susicious tickets OR&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;

&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Schedule
task to write possible bad tickets to application event log for log/SIEM review&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;

&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;Collection
Considerations :&lt;/b&gt;&lt;b&gt; &lt;/b&gt;Consider
running local scripts and collecting the application event log rather than a
scan to reduce noise See&amp;nbsp;here&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;

&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Analysis
Techniques:Comparative
time analysis of domain policy vs cached tickets&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;background-color: #ffa400;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p lang=&quot;en-US&quot; style=&quot;margin-bottom: 0in; margin-right: 0in; margin-top: 0in; text-align: left;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Identify suspicious TGT (Golden) and TGS (Silver) tickets&lt;span&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;

&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Event ID:
4624 (Account Logon)&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;

&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;The
Account Domain field is DOMAIN FQDN when it should be DOMAIN.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;

&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Event ID:
4672 (Admin Logon)&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;

&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Account
Domain is blank &amp;amp; should be DOMAIN.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;

&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Event ID:
4768 (Kerberos TGS Request)&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;

&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;The
Account Domain field is DOMAIN FQDN when it should be DOMAIN.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li lang=&quot;en-US&quot; style=&quot;margin-bottom: 0px; margin-top: 0px; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span&gt;&lt;span&gt;The Account Domain field is
     blank when it should be DOMAIN&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span&gt;&lt;span&gt;The Account Domain field is
     DOMAIN FQDN when it should be DOMAIN.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span&gt;&lt;span&gt;Account Name is a different
     account from the Security ID.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;

&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p lang=&quot;en-US&quot; style=&quot;margin: 0in 0in 0in 0.375in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p lang=&quot;en-US&quot; style=&quot;margin-bottom: 0in; margin-right: 0in; margin-top: 0in; text-align: left;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;span style=&quot;background-color: #e06666;&quot;&gt; &lt;span style=&quot;font-weight: bold;&quot;&gt;BloodHound &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;BloodHound is an Active Directory (AD) reconnaissance tool.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;

&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;BloodHound outputs results as JSON files&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;

&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;BloodHound can collect information about the following objects
(users, computers, groups, gpos)&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;

&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;BloodHound can archive collected a ZIP file&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;

&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Hunt for Suspicious Process execution via Services.exe&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;

&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;Hunt for Suspicious Process Injection&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;

&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.maximusit.net/feeds/4334774232706481498/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.maximusit.net/2022/06/kerberoasting-attack-and-detection.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/4334774232706481498'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/4334774232706481498'/><link rel='alternate' type='text/html' href='http://www.maximusit.net/2022/06/kerberoasting-attack-and-detection.html' title='Kerberoasting Attack and Detection'/><author><name>Faysal Hasan</name><uri>http://www.blogger.com/profile/11837891241239740342</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgM9uBAQadPAw2BkBDNuZIbNqlQZ9dvz-GvJ01dh3WqbDX8ldbZGZQYkLgbwMR9bgPnTvitoljRRHhdQx-PEbBMEOC5j7T7F9j3IcUoq8RqQTc9GCHnRvkZEmntgODCFn_2_t2nhwxYN4Qzh5froGEe4Vp0wuNMvrA53VmV6f8TgLfv-LP44Nc9XjZjWQ/s72-w400-h200-c/kerbaroasting.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8774245130267339525.post-7114493639166063236</id><published>2022-06-19T02:21:00.004+10:00</published><updated>2022-06-19T02:56:21.621+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="viruses"/><title type='text'>Hacking , ATT&amp;CK phase , kill chain and incident response phases </title><content type='html'>&lt;p&gt;There are some common steps used by industry and most commons in Cyber field are listed below.&lt;br /&gt;&lt;/p&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;background-color: #ffa400;&quot;&gt;&lt;b&gt;&amp;nbsp;HACKING Methodology (Steps)&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/h2&gt;&lt;p&gt;Footprinting (whois,nslookup) »&amp;nbsp;&lt;/p&gt;&lt;p&gt;Scanning (Nmap,fping) »&amp;nbsp;&lt;/p&gt;&lt;p&gt;Enumeration (dumpACL, showmount, Iegion, rpcinfo »&amp;nbsp;&lt;/p&gt;&lt;p&gt;Gaining Access(Tcpdump) »&lt;/p&gt;&lt;p&gt;Escalating Privilege(John the ripper, getadmin) »&lt;/p&gt;&lt;p&gt;Pilfering (Rhosts. userdata, configtile. registry) »&amp;nbsp;&lt;/p&gt;&lt;p&gt;Covering Tracks (zap, rootkits) »&lt;/p&gt;&lt;p&gt;Creating Backdoors (corn, at, startup folder, keylogger, rdp) »&lt;/p&gt;&lt;p&gt;Denial Of Service (synk4, ping Of death).&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;background-color: #ffa400;&quot;&gt;MITRE ATT&amp;amp;CK:&lt;/span&gt;&lt;/b&gt;&lt;/h3&gt;&lt;p&gt;Reconnaissance»&amp;nbsp;&lt;/p&gt;&lt;p&gt;Resource Development »&amp;nbsp;&lt;/p&gt;&lt;p&gt;Initial Access»
Execution »&lt;/p&gt;&lt;p&gt;&amp;nbsp;Persistence »&lt;/p&gt;&lt;p&gt;&amp;nbsp;Privilege Escalation »&amp;nbsp;&lt;/p&gt;&lt;p&gt;Defense Evasion»&amp;nbsp;&lt;/p&gt;&lt;p&gt;Credential Access »&amp;nbsp;&lt;/p&gt;&lt;p&gt;Discovery »&lt;/p&gt;&lt;p&gt;&amp;nbsp;Lateral Movement »&lt;/p&gt;&lt;p&gt;&amp;nbsp;Collection »&lt;/p&gt;&lt;p&gt;Command and Control »&lt;/p&gt;&lt;p&gt;&amp;nbsp;Exfiltration»&lt;/p&gt;&lt;p&gt;&amp;nbsp;Impact.&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;background-color: #ffa400;&quot;&gt;CYBER KILL CHAN:&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/h3&gt;&lt;p&gt;Reconnaissance»&amp;nbsp; &lt;br /&gt;&lt;/p&gt;&lt;p&gt;Weaponization» &lt;br /&gt;&lt;/p&gt;&lt;p&gt;Delivery »&amp;nbsp; &lt;/p&gt;&lt;p&gt;Exploitation » &lt;br /&gt;&lt;/p&gt;&lt;p&gt;Installation » &lt;br /&gt;&lt;/p&gt;&lt;p&gt;Command and Control »&amp;nbsp; &lt;br /&gt;&lt;/p&gt;&lt;p&gt;Action and Objective .&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;background-color: #ffa400;&quot;&gt;&lt;b&gt;Incident Response:&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/h3&gt;&lt;p&gt;Identify »&amp;nbsp;
Protect »&amp;nbsp;
Detect »&amp;nbsp;
Respond»&amp;nbsp;
Recover.&amp;nbsp;&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;background-color: #ffa400;&quot;&gt;SANS Incident Response:&lt;/span&gt;&lt;/b&gt;&lt;/h3&gt;&lt;p&gt;&amp;nbsp;Preparation »&amp;nbsp;
Identification»&amp;nbsp;
Containment »&amp;nbsp;
Eradication »&amp;nbsp;
Recovery »&amp;nbsp;
Lesson Learned
&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.maximusit.net/feeds/7114493639166063236/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.maximusit.net/2022/06/hacking-att-phase-kill-chain-and.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/7114493639166063236'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8774245130267339525/posts/default/7114493639166063236'/><link rel='alternate' type='text/html' href='http://www.maximusit.net/2022/06/hacking-att-phase-kill-chain-and.html' title='Hacking , ATT&amp;CK phase , kill chain and incident response phases '/><author><name>Faysal Hasan</name><uri>http://www.blogger.com/profile/11837891241239740342</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>