<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Cyber Journey]]></title><description><![CDATA[Cyber Journey]]></description><link>https://cyberjourney.eu</link><generator>RSS for Node</generator><lastBuildDate>Thu, 09 Apr 2026 07:42:12 GMT</lastBuildDate><atom:link href="https://cyberjourney.eu/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><item><title><![CDATA[Importance of IoT security. RFID world.]]></title><description><![CDATA[Intro
IoT nowadays is everywhere. Now there’s about 20 billion IoT devices. In 2031 there will be around 35 billion IoT devices connected to the internet.
Interesting information about IoT devices & other stuff
When more network devices we have and m...]]></description><link>https://cyberjourney.eu/importance-of-iot-security-rfid-world</link><guid isPermaLink="true">https://cyberjourney.eu/importance-of-iot-security-rfid-world</guid><category><![CDATA[iot]]></category><category><![CDATA[IoT security]]></category><category><![CDATA[iot solutions]]></category><category><![CDATA[Linux]]></category><category><![CDATA[hacking]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[CyberSec]]></category><category><![CDATA[learning]]></category><category><![CDATA[OTW]]></category><category><![CDATA[Hashnode]]></category><category><![CDATA[Learning Journey]]></category><category><![CDATA[cyber security]]></category><category><![CDATA[cyber]]></category><category><![CDATA[cybr]]></category><dc:creator><![CDATA[Jonas Satkauskas]]></dc:creator><pubDate>Fri, 09 Jan 2026 11:02:02 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1767956411852/f74729f7-f945-4f59-a677-671691a6b9b1.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 id="heading-intro">Intro</h2>
<p>IoT nowadays is everywhere. Now there’s about 20 billion IoT devices. In 2031 there will be around 35 billion IoT devices connected to the internet.</p>
<h2 id="heading-interesting-information-about-iot-devices-amp-other-stuff">Interesting information about IoT devices &amp; other stuff</h2>
<p>When more network devices we have and more digital components ads up to the systems, we get bigger attack surface.</p>
<p>SCADA/ICS are also very very important. The Industrial systems are in control of our water and electricity.</p>
<ul>
<li>The best hack is the one that nobody has discovered.</li>
</ul>
<p>Microwave is working on the same frequency as the Wi-Fi - 2.4-2.5GHz. If you’ll turn on the microwave, it will jam the Wi-Fi signal.</p>
<p>On IoT device’s small Linux systems, there’s not enough storage place for a good encryption or other security methods. Encryption takes computing power.</p>
<h3 id="heading-interesting-attacks">Interesting attacks:</h3>
<ul>
<li><p>Node Cloning</p>
<ul>
<li>You can clone a bluetooth device. It can send a communication to the device which is paired with simillar MAC Address device.</li>
</ul>
</li>
<li><p>Zigbee - it is a main protocol for IoT</p>
</li>
</ul>
<h3 id="heading-speed-vs-security">Speed vs Security</h3>
<p>IoT devices need speed. It does not have time for encryption. If you encrypt data, it takes time and time means latency. So IoT transfers data in clear text.</p>
<h3 id="heading-iot-os">IoT OS</h3>
<p>Most of the IoT devices are using <a target="_blank" href="https://openwrt.org/">OWRT</a>.</p>
<h2 id="heading-stride-classification-model">STRIDE Classification Model</h2>
<ol>
<li><p>Spoofing</p>
</li>
<li><p>Tampering</p>
</li>
<li><p>Repudiation</p>
</li>
<li><p>Information Disclosure</p>
</li>
<li><p>Denial of Service</p>
</li>
<li><p>Elevation of Privilege</p>
</li>
</ol>
<h4 id="heading-3-steps-of-stride">3 steps of STRIDE</h4>
<ol>
<li><p>Identify the Architecture</p>
</li>
<li><p>Identify the Architecture Components</p>
</li>
<li><p>Identify the Threats</p>
</li>
</ol>
<h3 id="heading-security-solutions">Security solutions</h3>
<ul>
<li>You can set up the devices to use different ports. Not the default ports. Just as like default credentials. Change ports and credentials.</li>
</ul>
<h3 id="heading-tools-for-iot-reconnaissance">Tools for IoT Reconnaissance</h3>
<p>One of the best tools is header grabber - Shodan. This is the main point where you want to go.</p>
<h2 id="heading-cameras">Cameras</h2>
<p>Hikvision and Dahua Technology ar chinese cameras and they are very insecure.</p>
<p>They are sold also as a white label. <strong>Dahua and Hikvision have 100+ relabelers/OEMs.</strong></p>
<h4 id="heading-main-cameras-protocols">Main cameras protocols:</h4>
<ul>
<li><p>RTSP (Real-Time Streaming Protocol) - usually port 554. Sometimes owners wants to change the port and they just add one more 5, so the port will be 5554 or 8554. Ending by “54” is most of the time will be a camera. RTSP is used only for cameras.</p>
<ul>
<li><p>Used for Live Streaming</p>
</li>
<li><p>Example would look rtsp://example.com</p>
</li>
</ul>
</li>
<li><p>RTP (Real-Time Transport Protocol)</p>
</li>
<li><p>PSIA</p>
<ul>
<li>Used for configuration, camera discovery and live streaming (using RTSP)</li>
</ul>
</li>
<li><p>ONVIF (Open Network Video Inteface Forum) - it allows access through a set of standardized API’s.</p>
<ul>
<li><p>Used for camera discovery, configuration and live streaming (using RTSP)</p>
</li>
<li><p>ONVIF requests are transmitted through XML SOAP messages.</p>
</li>
</ul>
</li>
</ul>
<p>List of default cameras passwords:</p>
<p><a target="_blank" href="https://camlytics.com/default-passwords">Link</a></p>
<p><strong>Always try the simplest technique first.</strong></p>
<p><a target="_blank" href="https://github.com/Ullaakut/cameradar">cameradar</a> is a best tool to brute force credentials and fint the route.</p>
<p>Some vulns found in Dahua cameras:</p>
<p>CVE-2021-33044</p>
<p>CVE-2021-33045</p>
<h3 id="heading-shodan-api">Shodan API</h3>
<p>You can use <a target="_blank" href="https://developer.shodan.io/api">Shodan API</a>. Install it via pip:</p>
<p><code>pip install shodan</code></p>
<p><code>shodan init</code></p>
<p><code>shodan search &lt;example&gt;</code></p>
<p>You can use API and then put the search results into a file and save it for later</p>
<h3 id="heading-camera-hacking">Camera hacking</h3>
<ul>
<li><p>It is important to check what is the firmware. If the firmware is 3.0+, it was patched.</p>
</li>
<li><p>There’s a <a target="_blank" href="https://github.com/bp2008/DahuaLoginBypass">chrome extension</a> which helps to make MiTM attack to get the password reset for the dahua camera.</p>
</li>
<li><p>To see the camera you need to use Microsoft Edge (a.k.a. Internet Explorer)</p>
</li>
<li><p><strong>The best hack is the one that victim does not know about.</strong></p>
</li>
<li><p>Always cover your tracks!</p>
</li>
<li><p>You should make upload validation for firmware version updates. There are input validations, but there also should be upload validation.</p>
</li>
<li><p><strong>There’s always a way to get into the system</strong></p>
</li>
</ul>
<h4 id="heading-useful-tools">Useful Tools</h4>
<ul>
<li><p>Pale Moon browser (Also streams video from cameras) - use 32bit version.</p>
</li>
<li><p>Mousepad - a good txt editor for Kali. Don’t think that it will be better than Nano though :D</p>
</li>
<li><p>Ipinfo.io - useful info about IPs</p>
</li>
<li><p><strong>Do not leave a user with a name admin. It makes a lot easier for an attacker to get in. He only need to guess the password.</strong></p>
</li>
</ul>
<h2 id="heading-rfid">RFID</h2>
<p>RFID is a form of anti-theft control. It is a way to track the items/people/products and other stuff.</p>
<ul>
<li><p>RFID readers can act as IoT devices.</p>
</li>
<li><p>RFID usually feeds data into the IoT network.</p>
</li>
</ul>
<h3 id="heading-rfid-tags">RFID Tags</h3>
<p>There are active, passive and semi-passive tags.</p>
<ul>
<li>It has it’s own power source</li>
</ul>
<p>Advantages of RFID are:</p>
<ul>
<li><p>Speed</p>
</li>
<li><p>Durability</p>
</li>
<li><p>Security - if it is encrypted. Encryption has to be good.</p>
</li>
</ul>
<p>NFC is a sub-set of RFID.</p>
<p>You could use high gain antena and pick the NFC signal.</p>
<h3 id="heading-challenges-of-rfid">Challenges of RFID</h3>
<ul>
<li><p>Cost</p>
</li>
<li><p>Interference</p>
</li>
<li><p>Privacy</p>
</li>
</ul>
<h3 id="heading-additional-info-about-rfid">Additional info about RFID</h3>
<p>Low frequency = low range</p>
<p><strong>Higher frequency = more memory</strong></p>
<p><strong>Higher frequency = Problems with interference</strong></p>
<p>MIFARE is a most popular player. They are made by NXP technology, a dominant player in this field.</p>
<p>2G/3G mobile phones operate at Ultra-High Frequency (UHF) - 860-960 MHz.</p>
<p>LF cards are easier to work with. It is also easier to clone.</p>
<h2 id="heading-vpn-security">VPN security</h2>
<p>If you use VPN, you hide your traffic from ISP. Of course if you use cookies, you show lots of information to the endpoint. It does not matter that you use VPN. VPN does not make you safe.</p>
<p>If you use for example VPN + Firewall + IDS, it is safer, because there are more layers that attacker has to pass.</p>
<p>Fortinet is not very secure, there has been many CVEs showing Fortinet gaps.</p>
<h2 id="heading-router-security">Router security</h2>
<p><strong>If you compromise the router, you own all of the traffic on the network.</strong></p>
<p>RouterSploit works good for easy stuff. Always use the easiest way first.</p>
<p>When you compromise SNMP v1, you are in the network. There’s a good tool in Kali - <em>snmpcheck.</em></p>
<p>There are also some other good tools for routers security cracking.</p>
<h2 id="heading-bluetooth-security">Bluetooth security</h2>
<p>There are some HW tools which makes the cracking BL/BLE security easier.</p>
<p>You should keep in mind that Bluetooth is difficult to jam, because it does frequency hopping.</p>
<p><strong>One of the key BL security is frequency hopping.</strong></p>
<p><a target="_blank" href="https://en.wikipedia.org/wiki/Hedy_Lamarr">Hedy Lamarr</a> invented the bluetooth frequency hopping.</p>
<p>For example your keyboard has bluetooth and you crack the keyboards bluetooth security. Then you can send the keystrokes to the computer remotely. If you send keystrokes, you control the device.</p>
<h4 id="heading-bluetooth-classic">Bluetooth classic</h4>
<ul>
<li><p>It operates at 2.4GHz ISM</p>
</li>
<li><p>It uses 79 channels, each spaced by 1MHz apart, ranging from 2402MHz to 2480MHz</p>
</li>
<li><p>Typical range - up to 100 meters</p>
</li>
<li><p>Each Bluetooth device has a unique 48-bit address (BD_ADDR)</p>
</li>
<li><p>It consumes more power than BLE (Bluetooth Low Energy)</p>
</li>
</ul>
<h4 id="heading-bluetooth-ble">Bluetooth BLE</h4>
<p>It operates in 2.4GHz ISM band. It uses 40 2-MHz channels. Typical range up to 50 meters</p>
<ul>
<li><p>It allows devices to work for months or even years with a small battery. Device only wakes up when it is needed.</p>
</li>
<li><p>It supports 2 types of communication - device to device and broadcast-based.</p>
</li>
<li><p>Key protocols are GATT (Generic Attribute Profile) and GAP (Generic Access Profile)</p>
</li>
<li><p>It is not compatible with Bluetooth classic. Usually devices has both, BLE and Bluetooth Classic.</p>
</li>
<li><p>BLE is ideal for IoT.</p>
</li>
</ul>
<h4 id="heading-mesh">Mesh</h4>
<p>Possibly Mesh networking will be the future.</p>
<h2 id="heading-outro">Outro</h2>
<p>It was really interesting to dive into these technologies. I’ve used some Linux tools, I’ve purchased some HW for the tasks.</p>
<p>Security of these technologies is really important. It is a great challenge, but with great challenges comes the best experience and lessons.</p>
<p>As always I’d like to give a big credit to Master OTW. I really like his learning style. If you want to dive deeper into IoT hacking. Check out <a target="_blank" href="https://hackersarise.thinkific.com/courses/iot-hacking">OTW course on Hackers-Arise</a>.</p>
]]></content:encoded></item><item><title><![CDATA[Home Lab Introduction]]></title><description><![CDATA[Intro
When I was learning cybersecurity topics in the past year, I’ve grasped lots of different tools and techniques.
Some of the most iconic for me were:

CAN BUS (controller area network)

Radio Frequency

Cryptography


I was lucky to have an oppo...]]></description><link>https://cyberjourney.eu/home-lab-introduction</link><guid isPermaLink="true">https://cyberjourney.eu/home-lab-introduction</guid><category><![CDATA[Homelab]]></category><category><![CDATA[Honeypot]]></category><category><![CDATA[learning]]></category><category><![CDATA[Learning Journey]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[CyberSec]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[experimentation]]></category><category><![CDATA[cybr]]></category><category><![CDATA[Linux]]></category><category><![CDATA[#Mikrotik]]></category><category><![CDATA[tplink]]></category><category><![CDATA[hacking]]></category><category><![CDATA[Hashnode]]></category><dc:creator><![CDATA[Jonas Satkauskas]]></dc:creator><pubDate>Sat, 20 Dec 2025 17:07:49 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1766250286279/82896dc7-878b-4ed5-a0b2-3adabda13b31.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 id="heading-intro">Intro</h2>
<p>When I was learning cybersecurity topics in the past year, I’ve grasped lots of different tools and techniques.</p>
<p>Some of the most iconic for me were:</p>
<ol>
<li><p>CAN BUS (controller area network)</p>
</li>
<li><p>Radio Frequency</p>
</li>
<li><p>Cryptography</p>
</li>
</ol>
<p>I was lucky to have an opportunity to learn from OTW books. I really like his learning style.</p>
<p>Anyway, when I was studying, one thing seriously caught my attention and I knew that I will try to build it - Honeypot.</p>
<p>I was surprised that this method is actually in use to defend against “bad guys”.</p>
<h2 id="heading-homelab-begins">Homelab begins</h2>
<p>I wanted to build honeypot, for that i needed HW (aka Homelab). That’s when I decide to analyze what kind of HW I need.</p>
<p>I’ve already had Raspberry Pi 3B, it’s a decent micro computer for some tasks. I needed some networking hardware.</p>
<p>I bought MikroTik router and TP-Link 8 ports switch. I also had to buy few ethernet cables.</p>
<p>Having your own router is a good option to legally break network. You can test your Wi-Fi breaking skills and experiment with different configurations.</p>
<h3 id="heading-gear-used">Gear used</h3>
<p>TP-Link TL-SG108E Gigabit Switch</p>
<p>Mikrotik hAP ac2</p>
<p>Raspberry Pi 3b</p>
<h2 id="heading-honey-pot">Honey Pot</h2>
<p>It took me some time to finally try to build a honeypot. Life happens as the old saying says.</p>
<p>So yeah, I began to dive deeper, to plan, to make a schema on how it should look like. I was thinking on how can I scale it in the future.</p>
<h3 id="heading-first-lesson">First lesson</h3>
<p>When I’ve connected the Ethernet wires and I’ve tried to connect to the Switch admin panel I’ve got some difficulties. After about 30 minutes I’ve found out that I cannot connect to the Switch, because my ISP router blocks the connection and the craziest thing is that ISP router is also a TP-Link, so the admin login page looks the same.</p>
<p>It is only one lesson which I had. There were many others.</p>
<p>Here’s the schema of my current home lab:</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1767079541454/0a6c04c1-596d-4486-81b2-ac3c4a1feba1.png" alt class="image--center mx-auto" /></p>
<h2 id="heading-current-phase">Current phase</h2>
<p>Now I have software set up on my Raspberry. I also have VLAN configured in the Switch for the honeypot.</p>
<p>Problems that I’m solving now:</p>
<ol>
<li><p>Making Mikrotik to act as a separate router, not to be on the same subnet as my ISP router. I already found the way to do it. Using <code>mactelnet</code> I can connect to the Mikrotik using it’s MAC address. Then I have full admin privilege for the router.</p>
</li>
<li><p>Before turning the honeypot on, I want to make sure to keep my anonymity, because let’s be real. I will open the doors for all hackers around the world. I’m thinking that maybe I could rent a place somewhere to keep the home lab running.</p>
</li>
</ol>
<h3 id="heading-vision-for-later">Vision for later</h3>
<ol>
<li><p>After the successful launch, I’m planning to set up a log management system. Possible options are:</p>
<ol>
<li><p>ELK / OpenSearch</p>
</li>
<li><p>Graylog / Loki + Grafana</p>
</li>
</ol>
</li>
<li><p>For alerts and SIEM I’m thinking to try Wazuh.</p>
</li>
</ol>
<p>Now I’m diving deep into the TCP/IP. I have physical Charles M. Kozierok TCP/IP guide. That knowledge will let me understand on how the process works from the smallest technical details and why things break.</p>
<h2 id="heading-outro">Outro</h2>
<p>I learn new thing every experiment session that I have.</p>
<p>I remember one guy who told me - “why do you need physical lab? Just use virtual machines”. The answer is - physical lab gives you the real feel on how the set up happens. For example that case where the ISP router blocked the access to the Mikrotik router was really surprising. If you’d use virtual machines, you wouldn’t get these surprising scenarios.</p>
<p>So yeah, It is kind of an intro blog post about my home lab. For sure there will be other updates about the process.</p>
<p>Cheers and have a wonderful Christmas and a happy new year!</p>
]]></content:encoded></item><item><title><![CDATA[HTB CPTS: Study Sessin (NMAP - output,  scripts, performance, timeouts)]]></title><description><![CDATA[What is Enumeration?
It is one of the most important parts of Penetration Testing process.
It is identifying all of the ways we could attack a target. We must do our best in this phase.
Long story short - enumeration is collecting as much information...]]></description><link>https://cyberjourney.eu/htb-cpts-study-sessin-nmap-output-scripts-performance-timeouts</link><guid isPermaLink="true">https://cyberjourney.eu/htb-cpts-study-sessin-nmap-output-scripts-performance-timeouts</guid><category><![CDATA[cybersecurity]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[CyberSec]]></category><category><![CDATA[cyber]]></category><category><![CDATA[cybr]]></category><category><![CDATA[learning]]></category><category><![CDATA[Learning Journey]]></category><category><![CDATA[htb]]></category><category><![CDATA[htb-cpts]]></category><category><![CDATA[Linux]]></category><category><![CDATA[nmap]]></category><category><![CDATA[#enumeration]]></category><category><![CDATA[hacking]]></category><category><![CDATA[hack]]></category><category><![CDATA[pentesting]]></category><dc:creator><![CDATA[Jonas Satkauskas]]></dc:creator><pubDate>Sat, 15 Nov 2025 14:04:51 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1763215275568/02a6e719-a438-4941-956f-d699490d7222.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 id="heading-what-is-enumeration">What is Enumeration?</h2>
<p>It is one of the most important parts of Penetration Testing process.</p>
<p>It is identifying all of the ways we could attack a target. We must do our best in this phase.</p>
<p>Long story short - <strong>enumeration is collecting as much information as possible.</strong></p>
<h3 id="heading-nmap">NMAP</h3>
<p>Nmap is for scanning, mapping, detecting and analyzing networks. Talking about technical sides, this is how for example TCP-SYN(-sS) scan works:</p>
<ul>
<li><p>If our target sends a <code>SYN-ACK</code> flagged packet back to us, Nmap detects that the port is <code>open</code>.</p>
</li>
<li><p>If the target responds with an <code>RST</code> flagged packet, it is an indicator that the port is <code>closed</code>.</p>
</li>
<li><p>If Nmap does not receive a packet back, it will display it as <code>filtered</code>. Depending on the firewall configuration, certain packets may be dropped or ignored by the firewall.</p>
</li>
<li><p>The most effective host discovery method is to use <strong>ICMP echo requests</strong></p>
</li>
<li><p>Scan may not work because of the firewall. Later on we’ll check how to evade firewall and IDS/IPS.</p>
</li>
<li><p>The Connect scan (Full TCP Connect scan) is one of the least stealthy techniques, as it fully establishes a connection, which creates logs on most systems and is easily detected by modern IDS/IPS solutions.</p>
</li>
</ul>
<p>There are 6 states that we can obtain from a NMAP scan:</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>State</strong></td><td><strong>Description</strong></td></tr>
</thead>
<tbody>
<tr>
<td><code>open</code></td><td>This indicates that the connection to the scanned port has been established. These connections can be <strong>TCP connections</strong>, <strong>UDP datagrams</strong> as well as <strong>SCTP associations</strong>.</td></tr>
<tr>
<td><code>closed</code></td><td>When the port is shown as closed, the TCP protocol indicates that the packet we received back contains an <code>RST</code> flag. This scanning method can also be used to determine if our target is alive or not.</td></tr>
<tr>
<td><code>filtered</code></td><td>Nmap cannot correctly identify whether the scanned port is open or closed because either no response is returned from the target for the port or we get an error code from the target.</td></tr>
<tr>
<td><code>unfiltered</code></td><td>This state of a port only occurs during the <strong>TCP-ACK</strong> scan and means that the port is accessible, but it cannot be determined whether it is open or closed.</td></tr>
<tr>
<td>`open</td><td>filtered`</td></tr>
<tr>
<td>`closed</td><td>filtered`</td></tr>
</tbody>
</table>
</div><h3 id="heading-output-formats">Output formats</h3>
<p>We can save <code>nmap</code> outputs in many different formats:</p>
<ul>
<li><p>Normal output (<code>-oN</code>) with the <code>.nmap</code> file extension</p>
</li>
<li><p>Grepable output (<code>-oG</code>) with the <code>.gnmap</code> file extension</p>
</li>
<li><p>XML output (<code>-oX</code>) with the <code>.xml</code> file extension</p>
</li>
<li><p>Save the results in all formats <code>-oA</code></p>
</li>
</ul>
<p>With the XML output, we can easily create HTML reports that are easy to read, even for non-technical people. This is later very useful for documentation, as it presents our results in a detailed and clear way.</p>
<p>To convert the stored results from XML format to HTML, we can use the tool <code>xsltproc</code>.</p>
<h3 id="heading-service-enumeration">Service enumeration</h3>
<p>It is really important to determine the application and its version as accurately as possible. We can use this information to scan for known vulnerabilities and analyze the source code for that version if we find it.</p>
<p>This information can help us to search for a more precise exploit that fits the service and the operating system of our target.</p>
<p>Quick port scan is a good way to do it, because if we do more sophisticated scans, IDS can spot us and block out our IP.</p>
<pre><code class="lang-bash">sudo nmap IP_ADDRESS_TO_SCAN -p- -sV
</code></pre>
<p>-p- - scans all of the ports</p>
<p>-sV - gives us the versions of services</p>
<p>I bet you like to see progress happening. To do this, we can write use —stats-every option.</p>
<table><tbody><tr><td><p><code>--stats-every=5s</code></p></td><td><p>Shows the progress of the scan every 5 seconds.</p></td></tr></tbody></table>

<h3 id="heading-scripting-in-nmap">Scripting in NMAP</h3>
<p>There’s a possibility to use scripting in nmap. There are a total of 14 categories into which these scripts can be divided:</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>Category</strong></td><td><strong>Description</strong></td></tr>
</thead>
<tbody>
<tr>
<td><code>auth</code></td><td>Determination of authentication credentials.</td></tr>
<tr>
<td><code>broadcast</code></td><td>Scripts, which are used for host discovery by broadcasting and the discovered hosts, can be automatically added to the remaining scans.</td></tr>
<tr>
<td><code>brute</code></td><td>Executes scripts that try to log in to the respective service by brute-forcing with credentials.</td></tr>
<tr>
<td><code>default</code></td><td>Default scripts executed by using the <code>-sC</code> option.</td></tr>
<tr>
<td><code>discovery</code></td><td>Evaluation of accessible services.</td></tr>
<tr>
<td><code>dos</code></td><td>These scripts are used to check services for denial of service vulnerabilities and are used less as it harms the services.</td></tr>
<tr>
<td><code>exploit</code></td><td>This category of scripts tries to exploit known vulnerabilities for the scanned port.</td></tr>
<tr>
<td><code>external</code></td><td>Scripts that use external services for further processing.</td></tr>
<tr>
<td><code>fuzzer</code></td><td>This uses scripts to identify vulnerabilities and unexpected packet handling by sending different fields, which can take much time.</td></tr>
<tr>
<td><code>intrusive</code></td><td>Intrusive scripts that could negatively affect the target system.</td></tr>
<tr>
<td><code>malware</code></td><td>Checks if some malware infects the target system.</td></tr>
<tr>
<td><code>safe</code></td><td>Defensive scripts that do not perform intrusive and destructive access.</td></tr>
<tr>
<td><code>version</code></td><td>Extension for service detection.</td></tr>
<tr>
<td><code>vuln</code></td><td>Identification of specific vulnerabilities.</td></tr>
</tbody>
</table>
</div><p>So these are the categories of the scripts. There are scripts by themselves. For example a really useful script is <a target="_blank" href="https://nmap.org/nsedoc/scripts/http-enum.html"><strong><em>http-enum</em></strong></a>. It enumerates directories used by popular web applications and servers.</p>
<h3 id="heading-performance-of-scanning">Performance of scanning</h3>
<p>Sometimes network is big, very big. So we need to scan for useful information as fast as possible. There are few options which helps to complete the scan faster.</p>
<p>We can use various options:</p>
<ul>
<li><p>how fast (<code>-T &lt;0-5&gt;</code>),</p>
</li>
<li><p>with which frequency (<code>--min-parallelism &lt;number&gt;</code>),</p>
</li>
<li><p>which timeouts (<code>--max-rtt-timeout &lt;time&gt;</code>) the test packets should have</p>
</li>
<li><p>how many packets should be sent simultaneously (<code>--min-rate &lt;number&gt;</code>)</p>
</li>
<li><p>the number of retries (<code>--max-retries &lt;number&gt;</code>) for the scanned ports the targets should be scanned.</p>
</li>
</ul>
<h3 id="heading-timeouts">Timeouts</h3>
<p>For a packet to travel, it takes time. <code>Round-Trip-Time</code> - <code>RTT</code>.</p>
<p>Generally, <code>Nmap</code> starts with a high timeout (<code>--min-RTT-timeout</code>) of 100ms.</p>
<p>We can make a scan with adjusted RTT options:</p>
<pre><code class="lang-bash">sudo nmap 10.X.X.X/24 -F --initial-rtt-timeout 50ms --max-rtt-timeout 100ms
</code></pre>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>Scanning Options</strong></td><td><strong>Description</strong></td></tr>
</thead>
<tbody>
<tr>
<td><code>10.X.X.X/24</code></td><td>Scans the specified target network.</td></tr>
<tr>
<td><code>-F</code></td><td>Scans top 100 ports.</td></tr>
<tr>
<td><code>--initial-rtt-timeout 50ms</code></td><td>Sets the specified time value as initial RTT timeout.</td></tr>
<tr>
<td><code>--max-rtt-timeout 100ms</code></td><td>Sets the specified time value as maximum RTT timeout.</td></tr>
</tbody>
</table>
</div><p>Of course be careful. If we set the initial <code>RTT</code> timeout too short, we can overlook some useful info.</p>
<h3 id="heading-max-retries">Max Retries</h3>
<p>Another way to increase scan speed is by specifying the retry rate of sent packets (<code>--max-retries</code>). The default value is <code>10</code>, which is pretty much. We can set it to <code>2</code> or even <code>0</code> so after not receiving a response from a port, nmap will go to another port.</p>
<p>Example would look like this:<br /><code>sudo nmap 10.X.X.X/24 -F --max-retries 0</code></p>
<p>Again, like with the timeouts, keep in mind that by making the retries lower, we risk to overlook valuable information about our target.</p>
<h4 id="heading-rates">Rates</h4>
<p>When setting the minimum rate (<code>--min-rate &lt;number&gt;</code>) for sending packets, we tell <code>Nmap</code> to simultaneously send the specified number of packets. It will attempt to maintain the rate accordingly.</p>
<p>This method also can save you time when scanning with <code>nmap</code>.</p>
<h3 id="heading-timing">Timing</h3>
<p>The default timing template used when we have defined nothing else is the normal (<code>-T 3</code>).</p>
<p>We have 6 different timing templates in NMAP:</p>
<ul>
<li><p><code>-T 0</code> / <code>-T paranoid</code></p>
</li>
<li><p><code>-T 1</code> / <code>-T sneaky</code></p>
</li>
<li><p><code>-T 2</code> / <code>-T polite</code></p>
</li>
<li><p><code>-T 3</code> / <code>-T normal</code></p>
</li>
<li><p><code>-T 4</code> / <code>-T aggressive</code></p>
</li>
<li><p><code>-T 5</code> / <code>-T insane</code></p>
</li>
</ul>
<p>We can find more detailed information about templates in <a target="_blank" href="https://nmap.org/book/performance-timing-templates.html">nmap documentation.</a></p>
<h3 id="heading-thoughts-after-the-module">Thoughts after the module</h3>
<p>Nmap is indeed a very powerful tool. I was thinking about Nmap as a simple scanning tool, I was using it for basic scanning of the targets, to find open ports which I can invite myself inside.</p>
<p>After this module I see that scripts gets nmap to the whole new level. We can find lots of information using scripts.</p>
<p>I have a vision to dive deep into the TCP/IP and I see that the knowledge I’ll gain will be priceless when using tools such as nmap.</p>
<p>After practical rooms I’ve learned that curl is also useful for getting info from certain files on the web.</p>
<p>I’m also surprised how easy it is to adapt the nmap performance by your needs. You can cut the scanning time by half easily using some of the performance and timing options.</p>
<h3 id="heading-outro">OUTRO</h3>
<p>On the next blog post we’ll see how to avoid IPS/IDS and Firewalls with nmap.</p>
<p>Nmap makes some network traffic which, if not controlled, Firewalls can capture and block us.</p>
<p>See ya later!</p>
]]></content:encoded></item><item><title><![CDATA[HTB CPTS: Study session (Transferring files, Knowledge sources, Vulnerable Machines and apps, Reverse shell)]]></title><description><![CDATA[Transferring files

During any penetration testing exercise, it is likely that we will need to transfer files to the remote server.

There are few options for this:

One method is running a Python HTTP server on our machine and then using wget or cUR...]]></description><link>https://cyberjourney.eu/htb-cpts-study-session-transferring-files-knowledge-sources-vulnerable-machines-and-apps-reverse-shell</link><guid isPermaLink="true">https://cyberjourney.eu/htb-cpts-study-session-transferring-files-knowledge-sources-vulnerable-machines-and-apps-reverse-shell</guid><category><![CDATA[learning]]></category><category><![CDATA[Linux]]></category><category><![CDATA[Bash]]></category><category><![CDATA[bash script]]></category><category><![CDATA[reverse-shell]]></category><category><![CDATA[htb]]></category><category><![CDATA[htb-cpts]]></category><category><![CDATA[cybr]]></category><category><![CDATA[Learning Journey]]></category><category><![CDATA[hacking]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[#cybersecurity]]></category><dc:creator><![CDATA[Jonas Satkauskas]]></dc:creator><pubDate>Mon, 20 Oct 2025 08:33:49 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1760949090977/0bfb91f7-4908-4e9b-bf49-a0c76c8ffcfb.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3 id="heading-transferring-files">Transferring files</h3>
<ul>
<li>During any penetration testing exercise, it is likely that we will need to transfer files to the remote server.</li>
</ul>
<p>There are few options for this:</p>
<ul>
<li><p>One method is running a <a target="_blank" href="https://developer.mozilla.org/en-US/docs/Learn/Common_questions/set_up_a_local_testing_server">Python HTTP server</a> <a target="_blank" href="https://developer.mozilla.org/en-US/docs/Learn/Common_questions/set_up_a_local_testing_server">on our machine an</a>d then using <code>wget</code> or <code>cURL</code> to download the file on the remote host.</p>
</li>
<li><p>Another method to transfer files would be using <code>scp</code></p>
</li>
<li><p>When there are firewall protection we can use <a target="_blank" href="https://linux.die.net/man/1/base64">Base64 encoding/decoding</a></p>
</li>
<li><p>To validate that the transfer was successful, we can check the hash value on the target machine and on our machine with <code>md5sum &lt;file&gt;</code>.</p>
</li>
</ul>
<h3 id="heading-vulnerable-machines-and-applications">Vulnerable Machines and Applications</h3>
<p>Here’s a list of vulnerable machines/apps that are safe to train on:</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td><a target="_blank" href="https://owasp.org/www-project-juice-shop/">OWASP Juice Shop</a></td><td>Is a modern vulnerable web application written in Node.js, Express, and Angular which showcases the entire <a target="_blank" href="https://owasp.org/www-project-top-ten">OWASP Top Ten</a> along with many other real-world application security flaws.</td></tr>
</thead>
<tbody>
<tr>
<td><a target="_blank" href="https://docs.rapid7.com/metasploit/metasploitable-2-exploitability-guide/">Metasploitable 2</a></td><td>Is a purposefully vulnerable Ubuntu Linux VM that can be used to practice enumeration, automated, and manual exploitation.</td></tr>
<tr>
<td><a target="_blank" href="https://github.com/rapid7/metasploitable3">Metasploitable 3</a></td><td>Is a template for building a vulnerable Windows VM configured with a wide range of <a target="_blank" href="https://github.com/rapid7/metasploitable3/wiki/Vulnerabilities">vulnerabilities</a>.</td></tr>
<tr>
<td><a target="_blank" href="https://github.com/digininja/DVWA">DVWA</a></td><td>This is a vulnerable PHP/MySQL web application showcasing many common web application vulnerabilities with varying degrees of difficulty.</td></tr>
</tbody>
</table>
</div><h3 id="heading-blog">Blog</h3>
<p>Good blog to visit from time to time is - <a target="_blank" href="https://0xdf.gitlab.io/">https://0xdf.gitlab.io/</a></p>
<h3 id="heading-websites-to-train-windows-powershell-and-linux-terminal">Websites to train Windows Powershell and Linux Terminal</h3>
<p>Worth checking - <a target="_blank" href="https://underthewire.tech/wargames">Under The Wire</a> and <a target="_blank" href="https://overthewire.org/wargames/">Over The Wire</a>. You can also train Bash and Powershell scripts here.</p>
<h2 id="heading-types-of-pentesting">Types of Pentesting</h2>
<p>There are 3 main types of pentesting</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>Engagement</strong></td><td><strong>Description</strong></td></tr>
</thead>
<tbody>
<tr>
<td><code>Black-Box</code></td><td>Low level to no knowledge of a target. The penetration tester must perform in-depth reconnaissance to learn about the target. This may be an external penetration test where the tester is given only the company name and no further information such as target IP addresses, or an internal penetration test where the tester either has to bypass controls to gain initial access to the network or can connect to the internal network but has no information about internal networks/hosts. This type of penetration test most simulates an actual attack but is not as comprehensive as other assessment types and could leave misconfigurations/vulnerabilities undiscovered.</td></tr>
<tr>
<td><code>Grey-Box</code></td><td>In a grey-box test, the tester is given a certain amount of information in advance. This may be a list of in-scope IP addresses/ranges, low-level credentials to a web application or Active Directory, or some application/network diagrams. This type of penetration test can simulate a malicious insider or see what an attacker can do with a low level of access. In this scenario, the tester will typically spend less time on reconnaissance and more time looking for misconfigurations and attempting exploitation.</td></tr>
<tr>
<td><code>White-Box</code></td><td>In this type of test, the tester is given complete access. In a web application test, they may be provided with administrator-level credentials, access to the source code, build diagrams, etc., to look for logic vulnerabilities and other difficult-to-discover flaws. In a network test, they may be given administrator-level credentials to dig into Active Directory or other systems for misconfigurations that may otherwise be missed. This assessment type is highly comprehensive as the tester will have access to both sides of a target and perform a comprehensive analysis.</td></tr>
</tbody>
</table>
</div><ul>
<li>It is essential to get in the habit of taking extensive notes and saving all console output early on. The better we get at this while practicing, the more second nature it will become when on real-world engagements. Proper notetaking is critical for us as penetration testers and will significantly speed up the reporting process and ensure no evidence is lost.</li>
</ul>
<h3 id="heading-reverse-shell-cheat-sheets">Reverse shell cheat sheets</h3>
<ul>
<li><p><a target="_blank" href="https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md">https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md</a></p>
</li>
<li><p><a target="_blank" href="https://highon.coffee/blog/reverse-shell-cheat-sheet/">https://highon.coffee/blog/reverse-shell-cheat-sheet/</a></p>
</li>
</ul>
<h3 id="heading-thoughts-after-practical-exercises">Thoughts after practical exercises</h3>
<p>Process of gathering flag by the user and root was really cool. I saw the importance of OSINT. I’ve found the password to the admin user of the wordpress dashboard. All of the process looked something like this:</p>
<ul>
<li><p>OSINT</p>
</li>
<li><p>System enumeration to find sub-urls and users.</p>
</li>
<li><p>Login to admin account</p>
</li>
<li><p>Check plugins which are used for the site</p>
</li>
<li><p>Find an exploit which would work with one of the plugins</p>
</li>
<li><p>Create malicious PHP payload.</p>
</li>
<li><p>Import PHP payload to the vulnerable MyImages plugin. It does not care if you upload a jpg, pdf or php.</p>
</li>
<li><p>With malicious code uploaded we can open reverse shell while listening on <code>netcat</code></p>
</li>
<li><p>We’re in, but it is not comfortable to use plain web terminal, so we shall “summon” bash with python.</p>
</li>
<li><p>Locate what version of python is being used</p>
</li>
<li><p>Spawn the bash with <code>python3 -c 'import pty; pty.spawn("/bin/bash")'</code></p>
</li>
<li><p>You’re in.</p>
</li>
</ul>
<h3 id="heading-outro">OUTRO</h3>
<p>Let’s learn more tools. Follow my blog for more.</p>
<p>Try to learn one new thing everyday.</p>
]]></content:encoded></item><item><title><![CDATA[HTB CPTS: Study session (Privilege Escalation, Enumeration)]]></title><description><![CDATA[Privilege Escalation

Once we gain initial access to a box, we want to thoroughly enumerate the box to find any potential vulnerabilities we can exploit to achieve a higher privilege level.

There are checklists for privilege escalation online. A goo...]]></description><link>https://cyberjourney.eu/htb-cpts-study-session-privilege-escalation-enumeration</link><guid isPermaLink="true">https://cyberjourney.eu/htb-cpts-study-session-privilege-escalation-enumeration</guid><category><![CDATA[cybersecurity]]></category><category><![CDATA[cybr]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[CyberSec]]></category><category><![CDATA[cyber security]]></category><category><![CDATA[information security]]></category><category><![CDATA[infosec]]></category><category><![CDATA[Linux]]></category><category><![CDATA[Bash]]></category><category><![CDATA[Privilege Escalation]]></category><category><![CDATA[htb]]></category><category><![CDATA[cpts]]></category><category><![CDATA[htb-cpts]]></category><category><![CDATA[learning]]></category><category><![CDATA[Learning Journey]]></category><dc:creator><![CDATA[Jonas Satkauskas]]></dc:creator><pubDate>Wed, 15 Oct 2025 12:42:19 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1760532131587/6da1f77b-a461-4e05-bbbb-37f9308feec8.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 id="heading-privilege-escalation">Privilege Escalation</h2>
<ul>
<li><p>Once we gain initial access to a box, we want to thoroughly enumerate the box to find any potential vulnerabilities we can exploit to achieve a higher privilege level.</p>
</li>
<li><p>There are checklists for privilege escalation online. A good place is <a target="_blank" href="https://book.hacktricks.wiki/en/index.html">HackTricks</a>.</p>
</li>
</ul>
<p>There are some scripts for Linux and Windows Enumeration:</p>
<p>Linux:</p>
<ul>
<li><p>LinEnum</p>
</li>
<li><p>linuxprivchecker</p>
</li>
</ul>
<p>Windows:</p>
<ul>
<li><p>Seatbelt</p>
</li>
<li><p>JAWS</p>
</li>
</ul>
<p><strong>For server enumeration we could use</strong> <a target="_blank" href="https://github.com/peass-ng/PEASS-ng"><strong>Privilege Escalation Awesome Scripts Suite (PEASS)</strong></a><strong>.:</strong></p>
<ul>
<li>PEASS is a good place which is maintained and includes scripts for Windows And Linux</li>
</ul>
<p>We could also check Vulnerable Software with commands like:</p>
<ul>
<li><p><code>dpkg -l</code> or to check Program Files in windows.</p>
</li>
<li><p>To check what commands we can do as super users we can type - <code>sudo -l</code></p>
</li>
<li><p>To switch to the root user we can type <code>sudo su</code> . <em>By the way, su stands for super user.</em></p>
</li>
<li><p>We can exploit via sudo privileges. A good place to see what kind of commands can work with sudo is <a target="_blank" href="https://gtfobins.github.io/">GTFOBins</a></p>
</li>
<li><p>For windows there’s a list of programs that we can exploit too. <a target="_blank" href="https://lolbas-project.github.io/#">LOLBAS</a> is the place to look.</p>
</li>
</ul>
<h4 id="heading-scheduled-tasks">Scheduled Tasks</h4>
<ul>
<li><p>We can schedule a task</p>
</li>
<li><p>If we can write to a directory called by a cron job, we can write a bash script with a reverse shell command, which should send us a reverse shell when executed.</p>
</li>
<li><p>Directories where we should write scheduled tasks are:</p>
<ul>
<li><p><code>/etc/crontab</code></p>
</li>
<li><p><code>/etc/cron.d</code></p>
</li>
<li><p><code>/var/spool/cron/crontabs/root</code></p>
</li>
</ul>
</li>
</ul>
<h3 id="heading-thoughts-after-privilege-escalation-room-in-htb">Thoughts after privilege escalation room in HTB</h3>
<p>Privilege escalation is very important and very powerful part. When I was trying to escalate my privileges to another user it took some thought process. Very useful command is <code>sudo -l</code>. You can see what privileges as a super user you have.</p>
<p>Also a good method is to check the system info with <code>uname -a</code>.</p>
<p>Another method is to check installed packages on the system with <code>dpkg -l</code>. You can search for the “holes” in the packages with a tool like <a target="_blank" href="https://gtfobins.github.io/gtfobins/">GTFOBins</a>.</p>
<p>I’ve managed to get both flags, as a different user and as a root. It was also an interesting method to connect with ssh id_rsa.</p>
<h3 id="heading-outro">OUTRO</h3>
<p>Learn one new thing everyday and you will be armed with knowledge in the future.</p>
<p>See ya in the next blog posts.</p>
<p>Shout out to HTB for making learning Cyber Security so interactive, challenging and fun.</p>
]]></content:encoded></item><item><title><![CDATA[HTB CPTS: Study session (Note taking apps, Webserver tools, Shells)]]></title><description><![CDATA[Some good note taking options

Notepad++

GitBook (has fetures to host a page or make wiki page)

Cherrytree

Evernote

Sublime Text

Notion

Visual Studio Code


It is important to make sure that any client data is only stored locally and not synced...]]></description><link>https://cyberjourney.eu/htb-cpts-study-session-note-taking-apps-webserver-tools-shells</link><guid isPermaLink="true">https://cyberjourney.eu/htb-cpts-study-session-note-taking-apps-webserver-tools-shells</guid><category><![CDATA[cybersecurity]]></category><category><![CDATA[htb]]></category><category><![CDATA[learning]]></category><category><![CDATA[htb-cpts]]></category><category><![CDATA[cybr]]></category><category><![CDATA[Learning Journey]]></category><category><![CDATA[penetration testing]]></category><category><![CDATA[pentesting]]></category><dc:creator><![CDATA[Jonas Satkauskas]]></dc:creator><pubDate>Thu, 09 Oct 2025 09:18:47 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1760001489608/5e5f987f-b178-461d-bd78-a22f9a34133d.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3 id="heading-some-good-note-taking-options">Some good note taking options</h3>
<ul>
<li><p>Notepad++</p>
</li>
<li><p>GitBook (has fetures to host a page or make wiki page)</p>
</li>
<li><p>Cherrytree</p>
</li>
<li><p>Evernote</p>
</li>
<li><p>Sublime Text</p>
</li>
<li><p>Notion</p>
</li>
<li><p>Visual Studio Code</p>
</li>
</ul>
<p>It is important to make sure that any client data is only stored locally and not synced to the cloud if using one of these tools on real-world assessments.</p>
<p><strong>Every infosec professional should maintain a knowledge base.</strong></p>
<p>Start early with documentation.</p>
<ul>
<li>Usage of a VPN service <strong>does not</strong> guarantee anonymity or privacy but is useful for bypassing certain network/firewall restrictions or when connected to a possible hostile network</li>
</ul>
<h3 id="heading-services">Services</h3>
<ul>
<li><p>There are some really useful NMAP scripts for use. They are located at:</p>
<ul>
<li><pre><code class="lang-bash">    /usr/share/nmap/scripts/
</code></pre>
<p>  Syntax for using NMAP scripts is:</p>
</li>
<li><p><code>nmap --script &lt;script name&gt; -p&lt;port&gt; &lt;host&gt;</code></p>
</li>
</ul>
</li>
<li><p>A good tool for bruteforcing community string names is <code>onesixtyone</code>.</p>
</li>
</ul>
<h3 id="heading-web-services">Web Services</h3>
<ul>
<li><p>To find hidden files or directories on the webserver that are not intended for public access we can use these tools:</p>
<ul>
<li><p>ffuf</p>
</li>
<li><p>GoBuster</p>
</li>
<li><p>whatweb</p>
</li>
<li><p>curl - it is also important to be familiar with curl usage methods</p>
</li>
</ul>
</li>
<li><p>It is important to get familiar with HTTP status codes. We can find them <a target="_blank" href="https://en.wikipedia.org/wiki/List_of_HTTP_status_codes">here</a></p>
</li>
</ul>
<h3 id="heading-shells">Shells</h3>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Type of Shell</td><td>Method of Communication</td></tr>
</thead>
<tbody>
<tr>
<td><code>Reverse Shell</code></td><td>Connects back to our system and gives us control through a reverse connection.</td></tr>
<tr>
<td><code>Bind Shell</code></td><td>Waits for us to connect to it and gives us control once we do.</td></tr>
<tr>
<td><code>Web Shell</code></td><td>Communicates through a web server, accepts our commands through HTTP parameters, executes them, and prints back the output.</td></tr>
</tbody>
</table>
</div><ul>
<li><p>Reverse Shell is the most common type of shell.</p>
</li>
<li><p>Web shell is typically a web script like PHP or ASPX that accepts our command through HTTP request.</p>
</li>
</ul>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Web Server</td><td>Default Webroot</td></tr>
</thead>
<tbody>
<tr>
<td><code>Apache</code></td><td>/var/www/html/</td></tr>
<tr>
<td><code>Nginx</code></td><td>/usr/local/nginx/html/</td></tr>
<tr>
<td><code>IIS</code></td><td>c:\inetpub\wwwroot\</td></tr>
<tr>
<td><code>XAMPP</code></td><td>C:\xampp\htdocs\</td></tr>
</tbody>
</table>
</div><ul>
<li><p>A great benefit of a web shell is that it would bypass any firewall restriction in place, as it will not open a new connection on a port but run on the web port on <code>80</code> or <code>443</code>, or whatever port the web application is using.</p>
</li>
<li><p>Another great benefit is that if the compromised host is rebooted, the web shell would still be in place, and we can access it and get command execution without exploiting the remote host again.</p>
</li>
</ul>
]]></content:encoded></item><item><title><![CDATA[HTB CPTS: Risk Management Process]]></title><description><![CDATA[Organization must have efficient yet effective policy implementation for information security.
Risk management process can help:




StepExplanation



Identifying the RiskIdentifying risks the business is exposed to, such as legal, environmental, ma...]]></description><link>https://cyberjourney.eu/htb-cpts-risk-management-process</link><guid isPermaLink="true">https://cyberjourney.eu/htb-cpts-risk-management-process</guid><category><![CDATA[cybr]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[learning]]></category><category><![CDATA[htb]]></category><category><![CDATA[Learning Journey]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[infosec]]></category><category><![CDATA[information security]]></category><dc:creator><![CDATA[Jonas Satkauskas]]></dc:creator><pubDate>Tue, 30 Sep 2025 12:42:45 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1759236132575/9a9ba1f6-9632-47d7-92ad-f85c194dd91d.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Organization must have efficient yet effective policy implementation for information security.</p>
<p>Risk management process can help:</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Step</td><td>Explanation</td></tr>
</thead>
<tbody>
<tr>
<td><code>Identifying the Risk</code></td><td>Identifying risks the business is exposed to, such as legal, environmental, market, regulatory, and other types of risks.</td></tr>
<tr>
<td><code>Analyze the Risk</code></td><td>Analyzing the risks to determine their impact and probability. The risks should be mapped to the organization's various policies, procedures, and business processes.</td></tr>
<tr>
<td><code>Evaluate the Risk</code></td><td>Evaluating, ranking, and prioritizing risks. Then, the organization must decide to accept (unavoidable), avoid (change plans), control (mitigate), or transfer risk (insure).</td></tr>
<tr>
<td><code>Dealing with Risk</code></td><td>Eliminating or containing the risks as best as possible. This is handled by interfacing directly with the stakeholders for the system or process that the risk is associated with.</td></tr>
<tr>
<td><code>Monitoring Risk</code></td><td>All risks must be constantly monitored. Risks should be constantly monitored for any situational changes that could change their impact score, <code>i.e., from low to medium or high impact</code>.</td></tr>
</tbody>
</table>
</div><p>Main goal is to maintain CIA triad.</p>
<ul>
<li><p>A deep understanding of the risk management process is critical for anyone starting in information security.</p>
</li>
<li><p>It is essential to prioritize clear and accurate documentation from the very beginning.</p>
</li>
</ul>
]]></content:encoded></item><item><title><![CDATA[HTB CPTS: PoC, Post-Engagement, Reports and Documentation structure]]></title><description><![CDATA[Proof of Concept
Proof of Concept (PoC) or Proof of Principle is a project management term. In project management, it serves as proof that a project is feasible in principle.

We confirm discovered vulnerabilities.

We prepare steps that shows the vu...]]></description><link>https://cyberjourney.eu/htb-cpts-poc-post-engagement-reports-and-documentation-structure</link><guid isPermaLink="true">https://cyberjourney.eu/htb-cpts-poc-post-engagement-reports-and-documentation-structure</guid><category><![CDATA[#cybersecurity]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[cybr]]></category><category><![CDATA[CyberSec]]></category><category><![CDATA[infosec]]></category><category><![CDATA[#infosec]]></category><category><![CDATA[htb-cpts]]></category><category><![CDATA[Learning Journey]]></category><category><![CDATA[learning]]></category><dc:creator><![CDATA[Jonas Satkauskas]]></dc:creator><pubDate>Tue, 30 Sep 2025 12:01:59 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1759233669141/cda25560-9fd7-4ed8-936d-75cec7d7277d.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3 id="heading-proof-of-concept">Proof of Concept</h3>
<p><code>Proof of Concept</code> (<code>PoC</code>) or <code>Proof of Principle</code> is a project management term. In project management, it serves as proof that a project is feasible in principle.</p>
<ul>
<li><p>We confirm discovered vulnerabilities.</p>
</li>
<li><p>We prepare steps that shows the vulnerability to the owner</p>
</li>
<li><p>However, there is one significant disadvantage that has occurred from time to time. Once the administrators and developers have received such a script from us, it is easy for them to "fight" against our script. They focus on changing the systems so that the script we created no longer works.</p>
</li>
<li><p>For example, if a user uses the password <code>Password123</code>, the underlying vulnerability is not the password but the <code>password policy</code>. It can mean that there’s a problem in the organization. No strong password policy.</p>
</li>
</ul>
<h3 id="heading-post-engagement">Post-Engagement</h3>
<ul>
<li>We have Pre-Engagement in the beginning and Post-Engagement at the end.</li>
</ul>
<h4 id="heading-cleanup">Cleanup</h4>
<ul>
<li><p>After we’re done we need to perform a cleanup.</p>
<ul>
<li><p>Delete Tools</p>
</li>
<li><p>Delete scripts</p>
</li>
<li><p>Revert configuration changes</p>
</li>
</ul>
</li>
<li><p>We should have detailed notes of our activities so it will be easier to cleanup later.</p>
</li>
<li><p>If there are places where we cannot visit to delete scripts, we need to inform client about those places.</p>
</li>
<li><p>We should also document the cleanup process.</p>
</li>
</ul>
<h4 id="heading-documentation-and-reporting">Documentation and Reporting</h4>
<ul>
<li><p>Before ending the process completely we must prepare adequate documentation for all findings that we plan to include in our report.</p>
</li>
<li><p>We need top include:</p>
<ul>
<li><p>Command outputs</p>
</li>
<li><p>Screenshots</p>
</li>
<li><p>List of affected hosts</p>
</li>
</ul>
</li>
<li><p>We can’t keep any PII (Personal Identifiable Information)</p>
</li>
<li><p>We can’t keep incriminating info or other sensitive data we came across throughout testing.</p>
</li>
</ul>
<h4 id="heading-our-report-should-consist-of-the-following">Our Report should consist of the following:</h4>
<ul>
<li><p>An attack chain (in the event of full internal compromise or external to internal access) detailing steps taken to achieve compromise</p>
</li>
<li><p>A strong executive summary <strong>that a non-technical audience can understand</strong></p>
</li>
<li><p>Detailed findings specific to the client's environment that include a risk rating, finding impact, remediation recommendations, and high-quality external references related to the issue</p>
</li>
<li><p>Adequate steps to reproduce each finding so the team responsible for remediation can understand and test the issue while putting fixes in place</p>
</li>
<li><p>Near, medium, and long-term recommendations specific to the environment</p>
</li>
<li><p>Appendices which include information such as the target scope, OSINT data (if relevant to the engagement), password cracking analysis (if relevant), discovered ports/services, compromised hosts, compromised accounts, files transferred to client-owned systems, any account creation/system modifications, an Active Directory security analysis (if relevant), relevant scan data/supplementary documentation, and any other information necessary to explain a specific finding or recommendation further</p>
</li>
</ul>
<p>We create a draft report until and later on we modify it by adding answers to client questions.</p>
<h3 id="heading-report-review-meeting">Report Review Meeting</h3>
<p>Here after client receives a Report, we sit and talk about the results of our assessment. There can also be involved other team members of the company.</p>
<p>This is the meeting where there will be questions from the client.</p>
<p>Sometimes clients come with the list of questions about specific findings.</p>
<h4 id="heading-post-remediation-testing">Post-Remediation Testing</h4>
<p>Most engagements include post remediation testing as part of the project’s total cost.</p>
<ul>
<li><p>We will need to reaccess the target environment and test each issue to ensure it was appropriately remediated.</p>
</li>
<li><p>We will issue a post-remediation report such as:</p>
</li>
</ul>
<div class="hn-table">
<table>
<thead>
<tr>
<td>#</td><td>Finding Severity</td><td>Finding Title</td><td>Status</td></tr>
</thead>
<tbody>
<tr>
<td>1</td><td>High</td><td>SQL Injection</td><td>Remediated</td></tr>
<tr>
<td>2</td><td>High</td><td>Broken Authentication</td><td>Remediated</td></tr>
<tr>
<td>3</td><td>High</td><td>Unrestricted File Upload</td><td>Remediated</td></tr>
<tr>
<td>4</td><td>High</td><td>Inadequate Web and Egress Filtering</td><td>Not Remediated</td></tr>
<tr>
<td>5</td><td>Medium</td><td>SMB Signing Not Enabled</td><td>Not Remediated</td></tr>
<tr>
<td>6</td><td>Low</td><td>Directory Listing Enabled</td><td>Not Remediated</td></tr>
</tbody>
</table>
</div><p><strong>We should not be implementing changes ourselves</strong> or even giving precise remediation advice (i.e., for SQL Injection, we may say "sanitize user input" but not give the client a rewritten piece of code). This will help maintain the assessment's integrity and not introduce any potential conflict of interest into the process.</p>
<h3 id="heading-data-retention">Data Retention</h3>
<ul>
<li><p>We should retain evidence for some time after the penetration test in case questions arise about specific findings or to assist with retesting "closed" findings after the client has performed remediation activities.</p>
</li>
<li><p>Any data retained after the assessment should be stored in a secure location owned and controlled by the firm and encrypted at rest.</p>
</li>
<li><p>All data should be wiped from tester systems at the conclusion of an assessment.</p>
</li>
</ul>
<h3 id="heading-close-out">Close Out</h3>
<p>Once we have delivered the final report, assisted the client with questions regarding remediation, and performed post-remediation testing/issued a new report, we can finally close the project.</p>
<ul>
<li><p>Any artifacts leftover from the engagement are stored securely (encrypted)</p>
</li>
<li><p>The final steps would be invoicing the client and collecting payment for services rendered.</p>
</li>
<li><p>As we continually grow our technical skillset, we should always look for ways to improve our soft skills and become more well-rounded professional consultants. In the end, the <code>client will usually remember interactions</code> during the assessment, communication, and how they were treated/valued by the firm they engage.</p>
</li>
</ul>
<h3 id="heading-practice">Practice</h3>
<ul>
<li><p>All the theories in the world will be of no use to us if we cannot transfer them into practice and apply our knowledge to real-world, hands-on situations.</p>
</li>
<li><p>Technical skills are only half the battle, however. We also need excellent written and verbal communication skills to be effective penetration testers.</p>
</li>
<li><p>Have a friend or teammate act as a fictitious customer. Use that time to practice asking your initial scoping questions and defining the pentest you expect to deliver.</p>
</li>
<li><p>Penetration testing is fun. What some people may find boring, however, is an essential part: thorough documentation and strong reporting skills.</p>
</li>
<li><p>A client won't be able to do much with a vague two-page report.</p>
</li>
<li><p>That being said, if our presentation is sloppy and the report is difficult to follow or does not go in-depth on vulnerability reproduction steps and give clear remediation recommendations, or the executive summary is poorly written, our hard work will not be well-received.</p>
</li>
<li><p>Take notes while learning and while doing labs. These notes will be valuable as we move along in our careers.</p>
</li>
<li><p>We also need to learn how to write a non-technical documentation for non technical people. We also need to learn how to keep the quality and concise.</p>
</li>
</ul>
]]></content:encoded></item><item><title><![CDATA[HTB CPTS: Stages on Penetration Testing Process #1]]></title><description><![CDATA[After pre-engagement phase is completed, information gathering begins.
It’s a phase where we gather all available information about the company.
This is the phase which we return to multiple times.
OSINT
Open source intelligence is a great way to gat...]]></description><link>https://cyberjourney.eu/htb-cpts-stages-on-penetration-testing-process-1</link><guid isPermaLink="true">https://cyberjourney.eu/htb-cpts-stages-on-penetration-testing-process-1</guid><category><![CDATA[learning]]></category><category><![CDATA[htb]]></category><category><![CDATA[htb-cpts]]></category><category><![CDATA[IT]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[cybr]]></category><category><![CDATA[CyberSec]]></category><dc:creator><![CDATA[Jonas Satkauskas]]></dc:creator><pubDate>Tue, 30 Sep 2025 09:07:23 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1759223190783/7a5f606a-9151-4266-acf4-99334d19b136.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>After pre-engagement phase is completed, information gathering begins.</p>
<p>It’s a phase where we gather all available information about the company.</p>
<p>This is the phase which we return to multiple times.</p>
<h3 id="heading-osint">OSINT</h3>
<p>Open source intelligence is a great way to gather lots of information.</p>
<p>Pilaging is also one of the really important parts.</p>
<h2 id="heading-vulnerability-assessment">Vulnerability Assessment</h2>
<p>During this phase we examine and analyze the information gathered during information gathering phase.</p>
<p>There are four types of analysis:</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td><code>Descriptive</code></td><td>Descriptive analysis is essential in any data analysis. On the one hand, it describes a data set based on individual characteristics. It helps to detect possible errors in data collection or outliers in the data set.</td></tr>
</thead>
<tbody>
<tr>
<td><code>Diagnostic</code></td><td>Diagnostic analysis clarifies conditions' causes, effects, and interactions. Doing so provides insights that are obtained through correlations and interpretation. We must take a backward-looking view, similar to descriptive analysis, with the subtle difference that we try to find reasons for events and developments.</td></tr>
<tr>
<td><code>Predictive</code></td><td>By evaluating historical and current data, predictive analysis creates a predictive model for future probabilities. Based on the results of descriptive and diagnostic analyses, this method of data analysis makes it possible to identify trends, detect deviations from expected values at an early stage, and predict future occurrences as accurately as possible.</td></tr>
<tr>
<td><code>Prescriptive</code></td><td>Prescriptive analytics aims to narrow down what actions to take to eliminate or prevent a future problem or trigger a specific activity or process.</td></tr>
</tbody>
</table>
</div><ul>
<li><p>If we have to test covertly and avoid alerts, we should mirror the target system locally as precisely as possible.</p>
</li>
<li><p>Suppose we are unable to detect or identify potential vulnerabilities from our analysis. In that case, we will return to the Information Gathering stage and look for more in-depth information than we have gathered so far.</p>
</li>
</ul>
<h2 id="heading-exploitation">Exploitation</h2>
<ul>
<li><p>We must prioritize possible attacks.</p>
</li>
<li><p>There are methodologies like CVSS Scoring for this.</p>
<ul>
<li>We calculate the probability of seccess.</li>
</ul>
</li>
</ul>
<p>Example of CVSS:</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>Factor</strong></td><td><strong>Points</strong></td><td><strong>Remote File Inclusion</strong></td><td><strong>Buffer Overflow</strong></td></tr>
</thead>
<tbody>
<tr>
<td>1. Probability of Success</td><td><code>10</code></td><td>10</td><td>8</td></tr>
<tr>
<td>2. Complexity - Easy</td><td><code>5</code></td><td>4</td><td>0</td></tr>
<tr>
<td>3. Complexity - Medium</td><td><code>3</code></td><td>0</td><td>3</td></tr>
<tr>
<td>4. Complexity - Hard</td><td><code>1</code></td><td>0</td><td>0</td></tr>
<tr>
<td>5. Probability of Damage</td><td><code>-5</code></td><td>0</td><td>-5</td></tr>
<tr>
<td><strong>Summary</strong></td><td><code>max. 15</code></td><td>14</td><td>6</td></tr>
</tbody>
</table>
</div><h3 id="heading-post-exploitation">Post Exploitation</h3>
<ul>
<li><p>This is the stage aims to obtain sensitive and security-relevant information.</p>
</li>
<li><p>In most cases we need higher privileges than a standard user.</p>
</li>
<li><p>This stage includes the following components:</p>
<ul>
<li><p>Evasive Testing</p>
<ul>
<li><p>If a skilled administrator monitors the systems, any change or even a single command could trigger an alarm that will give us away.</p>
</li>
<li><p>We can provide value to the client in this situation by still writing up an entire attack chain and helping them identify gaps in their monitoring and processes where they did not notice our actions.</p>
</li>
<li><p>Perhaps we did not thoroughly test a payload, or we got careless and ran a command such as <code>net user</code> or <code>whoami</code> that is often monitored by EDR systems and flagged as anomalous activity.</p>
</li>
</ul>
</li>
<li><p>Information Gathering</p>
<ul>
<li><p>Since we have new perspective about the system and the network, we need again gather as much information as possible</p>
</li>
<li><p>We also do Vulnerability Assessment here with new information</p>
</li>
</ul>
</li>
<li><p>Pillaging</p>
<ul>
<li><p>Pillaging is the stage where we examine the role of the host in the corporate network. We analyze the network configurations.</p>
</li>
<li><p>Some parts are:</p>
<ul>
<li><p>| Interfaces | Routing | DNS |
  | --- | --- | --- |
  | ARP | Services | VPN |
  | IP Subnets | Shares | Network Traffic |</p>
</li>
<li><p>It helps us to understand how different parts of the systems communicate</p>
</li>
</ul>
</li>
</ul>
</li>
<li><p>Vulnerability Assessment</p>
<ul>
<li>We can maintain access and we can use information about the system to repeat Vuln Assessment stage, but this time from inside the system.</li>
</ul>
</li>
</ul>
</li>
</ul>
<ul>
<li><p>Privilege Escalation</p>
<ul>
<li><p>The goal is to get the highest possible privileges on the system or domain.</p>
</li>
<li><p>If we have root privileges there are many doors open for us</p>
</li>
</ul>
</li>
<li><p>Persistence</p>
<ul>
<li><p>Once we have an overview of the system, our immediate next step is maintaining access to the exploited host.</p>
</li>
<li><p>We need a back door in other words</p>
</li>
<li><p>This step is essential and often used as the first step before the <code>Information Gathering</code> and <code>Pillaging</code> stages.</p>
</li>
</ul>
</li>
<li><p>Data Exfiltration</p>
<ul>
<li><p>During the <code>Information Gathering</code> and <code>Pillaging</code> stage, we will often be able to find personal information and customer data.</p>
</li>
<li><p>Many companies use encryption on the disks.</p>
</li>
<li><p>Important point about exfiltrating information is to write fake card number, change it, so that we do not hold the real sensitive information and we wont be responsible for any live sensitive data.</p>
</li>
</ul>
</li>
</ul>
<h3 id="heading-outro">Outro</h3>
<p>Thanks to HTB Academy for opportunity to learn.</p>
]]></content:encoded></item><item><title><![CDATA[HTB CPTS: Pre-Engagement Stage]]></title><description><![CDATA[It’s a stage where we prepare for the actual pentesting. It’s a place to ask questions. As many as you can.
It’s also a stage where we communicate with our client. We ask what needs does he have. After that we make a Kick-Off meeting.
To start any of...]]></description><link>https://cyberjourney.eu/htb-cpts-pre-engagement-stage</link><guid isPermaLink="true">https://cyberjourney.eu/htb-cpts-pre-engagement-stage</guid><category><![CDATA[htb]]></category><category><![CDATA[Linux]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[CyberSec]]></category><category><![CDATA[hacking]]></category><category><![CDATA[learning]]></category><category><![CDATA[Learning Journey]]></category><category><![CDATA[cybr]]></category><dc:creator><![CDATA[Jonas Satkauskas]]></dc:creator><pubDate>Thu, 25 Sep 2025 10:23:08 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1758795720554/845a1a63-3863-4cfd-b19b-5c8e3077c226.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>It’s a stage where we prepare for the actual pentesting. It’s a place to ask questions. As many as you can.</p>
<p>It’s also a stage where we communicate with our client. We ask what needs does he have. After that we make a Kick-Off meeting.</p>
<p>To start any of the process you need to first sign Non-Disclosure Agreement (NDA).</p>
<p>We must know who in the company is permitted to contract us for a penetration test. There can be employees who wants to do sabotage against the company that they work for.</p>
<p>There are some documents that we need to prepare:</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Document</td><td>Timing Of Creation</td></tr>
</thead>
<tbody>
<tr>
<td><code>1. Non-Disclosure Agreement</code> (<code>NDA</code>)</td><td><code>After</code> Initial Contact</td></tr>
<tr>
<td><code>2. Scoping Questionnaire</code></td><td><code>Before</code> the Pre-Engagement Meeting</td></tr>
<tr>
<td><code>3. Scoping Document</code></td><td><code>During</code> the Pre-Engagement Meeting</td></tr>
<tr>
<td><code>4. Penetration Testing Proposal</code> (<code>Contract/Scope of Work</code> (<code>SoW</code>))</td><td><code>During</code> the Pre-engagement Meeting</td></tr>
<tr>
<td><code>5. Rules of Engagement</code> (<code>RoE</code>)</td><td><code>Before</code> the Kick-Off Meeting</td></tr>
<tr>
<td><code>6. Contractors Agreement</code> (Physical Assessments)</td><td><code>Before</code> the Kick-Off Meeting</td></tr>
<tr>
<td><code>7. Reports</code></td><td><code>During</code> and <code>after</code> the conducted Penetration Test</td></tr>
</tbody>
</table>
</div><p>These documents should be reviewed by a lawyer after preparation.</p>
<p>We also need to be sure that we can deliver the assessment our client requires.</p>
<p>Here’s a list of questions that are worth of being asked:</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>How many expected live hosts?</td></tr>
</thead>
<tbody>
<tr>
<td>How many IPs/CIDR ranges in scope?</td></tr>
<tr>
<td>How many Domains/Subdomains are in scope?</td></tr>
<tr>
<td>How many wireless SSIDs in scope?</td></tr>
<tr>
<td>How many web/mobile applications? If testing is authenticated, how many roles (standard user, admin, etc.)?</td></tr>
<tr>
<td>For a phishing assessment, how many users will be targeted? Will the client provide a list, or we will be required to gather this list via OSINT?</td></tr>
<tr>
<td>If the client is requesting a Physical Assessment, how many locations? If multiple sites are in-scope, are they geographically dispersed?</td></tr>
<tr>
<td>What is the objective of the Red Team Assessment? Are any activities (such as phishing or physical security attacks) out of scope?</td></tr>
<tr>
<td>Is a separate Active Directory Security Assessment desired?</td></tr>
<tr>
<td>Will network testing be conducted from an anonymous user on the network or a standard domain user?</td></tr>
<tr>
<td>Do we need to bypass Network Access Control (NAC)?</td></tr>
</tbody>
</table>
</div><p>Final question to ask is what kind of pentest it will be - black box, grey box or white box?</p>
<p>This information is important for us to determine the timeline.</p>
<p>After that we prepare a <strong>Scoping Document</strong>.</p>
<h3 id="heading-pre-engagement-meeting">Pre-Engagement Meeting</h3>
<p>This meeting discusses all relevant and essential components with our customer before the penetration test. We explain them to our customer.</p>
<p>This phase typically occurs via e-mail and during an online conference call or in-person meeting.</p>
<p>We may encounter clients during our career that are undergoing their first ever penetration test, or the direct client PoC (Proof Of Concept) is not familiar with the process. It is not uncommon to use part of the pre-engagement meeting to review the scoping questionnaire either in part or step-by-step.</p>
<h3 id="heading-other-important-parts">Other important parts</h3>
<ul>
<li><p>It is important to get written agreements from third parties that they are aware of the penetration test happening</p>
</li>
<li><p>It’s also important to determine Limitations and restrictions.</p>
</li>
<li><p>We must prioritize our client’s wishes. Don’t do more than our client wants.</p>
</li>
</ul>
<h3 id="heading-rules-of-engagement">Rules of Engagement</h3>
<p>Here’s a check list for the Rules of Engagement:</p>
<table><tbody><tr><td><p>Checkpoint</p></td><td><p>Contents</p></td></tr><tr><td><p><code>Introduction</code></p></td><td><p>Description of this document.</p></td></tr><tr><td><p><code>☐ Contractor</code></p></td><td><p>Company name, contractor full name, job title.</p></td></tr><tr><td><p><code>☐ Penetration Testers</code></p></td><td><p>Company name, pentesters full name.</p></td></tr><tr><td><p><code>☐ Contact Information</code></p></td><td><p>Mailing addresses, e-mail addresses, and phone numbers of all client parties and penetration testers.</p></td></tr><tr><td><p><code>☐ Purpose</code></p></td><td><p>Description of the purpose for the conducted penetration test.</p></td></tr><tr><td><p><code>☐ Goals</code></p></td><td><p>Description of the goals that should be achieved with the penetration test.</p></td></tr><tr><td><p><code>☐ Scope</code></p></td><td><p>All IPs, domain names, URLs, or CIDR ranges.</p></td></tr><tr><td><p><code>☐ Lines of Communication</code></p></td><td><p>Online conferences or phone calls or face-to-face meetings, or via e-mail.</p></td></tr><tr><td><p><code>☐ Time Estimation</code></p></td><td><p>Start and end dates.</p></td></tr><tr><td><p><code>☐ Time of the Day to Test</code></p></td><td><p>Times of the day to test.</p></td></tr><tr><td><p><code>☐ Penetration Testing Type</code></p></td><td><p>External/Internal Penetration Test/Vulnerability Assessments/Social Engineering.</p></td></tr><tr><td><p><code>☐ Penetration Testing Locations</code></p></td><td><p>Description of how the connection to the client network is established.</p></td></tr><tr><td><p><code>☐ Methodologies</code></p></td><td><p>OSSTMM, PTES, OWASP, and others.</p></td></tr><tr><td><p><code>☐ Objectives / Flags</code></p></td><td><p>Users, specific files, specific information, and others.</p></td></tr><tr><td><p><code>☐ Evidence Handling</code></p></td><td><p>Encryption, secure protocols</p></td></tr><tr><td><p><code>☐ System Backups</code></p></td><td><p>Configuration files, databases, and others.</p></td></tr><tr><td><p><code>☐ Information Handling</code></p></td><td><p>Strong data encryption</p></td></tr><tr><td><p><code>☐ Incident Handling and Reporting</code></p></td><td><p>Cases for contact, pentest interruptions, type of reports</p></td></tr><tr><td><p><code>☐ Status Meetings</code></p></td><td><p>Frequency of meetings, dates, times, included parties</p></td></tr><tr><td><p><code>☐ Reporting</code></p></td><td><p>Type, target readers, focus</p></td></tr><tr><td><p><code>☐ Retesting</code></p></td><td><p>Start and end dates</p></td></tr><tr><td><p><code>☐ Disclaimers and Limitation of Liability</code></p></td><td><p>System damage, data loss</p></td></tr><tr><td><p><code>☐ Permission to Test</code></p></td><td><p>Signed contract, contractors agreement</p></td></tr></tbody></table>

<hr />
<ul>
<li><p>We must also inform our customers about potential risks during a penetration test</p>
</li>
<li><p>We must say that customers must contact us immediately if the penetration test performed negatively impacts their network.</p>
</li>
<li><p>Explaining process demonstrates our professional approach.</p>
</li>
</ul>
<h4 id="heading-contractors-agreement">Contractors Agreement</h4>
<p>If pentest is also physcial, different kind of laws apply here. We need to sign another agreement as “get out of jail for free” card.</p>
<p>Here’s a checklist:</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td><code>☐ Introduction</code></td></tr>
</thead>
<tbody>
<tr>
<td><code>☐ Contractor</code></td></tr>
<tr>
<td><code>☐ Purpose</code></td></tr>
<tr>
<td><code>☐ Goal</code></td></tr>
<tr>
<td><code>☐ Penetration Testers</code></td></tr>
<tr>
<td><code>☐ Contact Information</code></td></tr>
<tr>
<td><code>☐ Physical Addresses</code></td></tr>
<tr>
<td><code>☐ Building Name</code></td></tr>
<tr>
<td><code>☐ Floors</code></td></tr>
<tr>
<td><code>☐ Physical Room Identifications</code></td></tr>
<tr>
<td><code>☐ Physical Components</code></td></tr>
<tr>
<td><code>☐ Timeline</code></td></tr>
<tr>
<td><code>☐ Notarization</code></td></tr>
<tr>
<td><code>☐ Permission to Test</code></td></tr>
</tbody>
</table>
</div><h4 id="heading-outro">Outro</h4>
<p>I’m learning for a HTB CPTS certificate. Information that you’ve read is my knowledge base for the future.</p>
<p>I invite you to check <a target="_blank" href="https://www.hackthebox.com/">Hack The Box</a> for amazing courses and challenges.</p>
]]></content:encoded></item><item><title><![CDATA[HTB CPTS: Penetration testing process]]></title><description><![CDATA[Penetration testing is not only “cool hacking” actions and stunning results. It’s a process which has many stages.
Penetration testing process

There’s no step by step process in pentesting. There are stages.

Each stage builds on the other


Stages ...]]></description><link>https://cyberjourney.eu/htb-cpts-penetration-testing-process</link><guid isPermaLink="true">https://cyberjourney.eu/htb-cpts-penetration-testing-process</guid><category><![CDATA[htb]]></category><category><![CDATA[hacking]]></category><category><![CDATA[hack]]></category><category><![CDATA[Linux]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[CyberSec]]></category><category><![CDATA[cyber]]></category><category><![CDATA[information security]]></category><category><![CDATA[infosec]]></category><category><![CDATA[penetration testing]]></category><category><![CDATA[pentesting]]></category><category><![CDATA[Pentest]]></category><dc:creator><![CDATA[Jonas Satkauskas]]></dc:creator><pubDate>Tue, 23 Sep 2025 12:08:24 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1758629201394/cfd65ce3-c346-43db-9e41-21dc74cf8355.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Penetration testing is not only “cool hacking” actions and stunning results. It’s a process which has many stages.</p>
<h3 id="heading-penetration-testing-process">Penetration testing process</h3>
<ul>
<li><p>There’s no step by step process in pentesting. There are stages.</p>
</li>
<li><p>Each stage builds on the other</p>
</li>
</ul>
<p>Stages of the Penetration Testing:</p>
<ol>
<li><p>Pre-engagement</p>
<ol>
<li><p>It’s a stage for educating the client and adjusting the contract</p>
<ol>
<li>NDA, Goals, Scope, TIme estimation, Rules of Engagement</li>
</ol>
</li>
</ol>
</li>
<li><p>Information gathering</p>
<ol>
<li><p>Describes how to obtain information about the necessary components in various ways.</p>
</li>
<li><p>Looking for potential security gaps</p>
</li>
</ol>
</li>
<li><p>Vulnerability Assessment</p>
<ol>
<li><p>We analyze results from our Information Gathering stage</p>
</li>
<li><p>We look for knows vulnerabilities in the systems</p>
</li>
</ol>
</li>
<li><p>Exploitation</p>
<ol>
<li><p>We use the results to test our attacks against the potential vectors.</p>
</li>
<li><p>We try to gain initial access to the systems.</p>
</li>
</ol>
</li>
<li><p>Post-Exploitation</p>
<ol>
<li><p>At this stage we have access to the exploited machine.</p>
</li>
<li><p>We may try to escalate our privileges to obtain the highest possible rights.</p>
</li>
<li><p>We may hunt for sensitive data. For example credentials or other data.</p>
</li>
</ol>
</li>
<li><p>Lateral Movement</p>
<ol>
<li>It describes movement within the internal network of our target company.</li>
</ol>
</li>
<li><p>Proof-of-Concept</p>
<ol>
<li><p>In this stage we document the steps we took to achieve network compromise.</p>
</li>
<li><p>It is important do document our finding well, because company then can fix those gaps and they see the importance of every vulnerability fix.</p>
</li>
<li><p>We prove that the vulnerabilities exist.</p>
</li>
</ol>
</li>
<li><p>Post-engagement</p>
<ol>
<li><p>Detailed documentation is prepared now.</p>
</li>
<li><p>We clean up all traces of our actions on all hosts and servers.</p>
</li>
<li><p>We create the deliverables for our client.</p>
</li>
<li><p>Report walkthrough meeting is set up.</p>
</li>
</ol>
</li>
</ol>
<p>In the next article we’ll look at teach of the stages in detail.</p>
]]></content:encoded></item><item><title><![CDATA[Security+ Certified: Here's my journey (no AI used for writing/editing)]]></title><description><![CDATA[Intro
This is the day where I can introduce myself as a Certified Security Specialist. It was kind of a journey I’d say. Not only because of the certification itself, but because of the broader picture that I see after using many learning resources. ...]]></description><link>https://cyberjourney.eu/security-certified-heres-my-journey-no-ai-used-for-writingediting</link><guid isPermaLink="true">https://cyberjourney.eu/security-certified-heres-my-journey-no-ai-used-for-writingediting</guid><dc:creator><![CDATA[Jonas Satkauskas]]></dc:creator><pubDate>Mon, 18 Aug 2025 10:45:43 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1755506683367/30e6386a-7516-41a5-a915-dec4c4cda09b.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 id="heading-intro">Intro</h2>
<p>This is the day where I can introduce myself as a Certified Security Specialist. It was kind of a journey I’d say. Not only because of the certification itself, but because of the broader picture that I see after using many learning resources. I’d say that this journey was Security+++ and it is only a beginning. I’m so excited. I’d say that I had two semesters in my journey. Let’s dive deeper:</p>
<h3 id="heading-vision-when-starting">Vision when starting?</h3>
<p>Before starting my cyber transition journey I had a vision to dive deeper. Not only into the Security+ (which itself is kind of a broad cert).</p>
<p>First of all I wanted to dive deeper into Linux. I was using it for a few years before, but I wanted to understand it more deeply. The possibilities on Linux OS is endless.</p>
<p>After that I wanted to understand Network, which is a very important topic in a context of Cyber Security.</p>
<p>After Network I wanted to understand tools and techniques which are used in Cyber Security world (not all of them, but at least the most popular).</p>
<p>Important part about my journey is that <strong>I’ve used Physical Books</strong>. I’ve bought them and I have them as a cheat sheets.</p>
<h2 id="heading-first-semester">FIRST SEMESTER</h2>
<h3 id="heading-linux-basics-for-hackers">Linux Basics for Hackers</h3>
<p><a target="_blank" href="https://www.amazon.com/Linux-Basics-Hackers-Networking-Scripting/dp/1593278551">This book</a> was very fun and interesting. I really love how Master OTW writes. Real world examples, history of computers and stuff like that. I really enjoyed tasks after every chapter. It gave me lots of practical skills and understanding about Linux OS.</p>
<h3 id="heading-network-basics-for-hackers">Network Basics for Hackers</h3>
<p>I really wanted to dive into <a target="_blank" href="https://www.amazon.com/Network-Basics-Hackers-Networks-Break/dp/B0BS3GZ1R9?crid=2S5AIM92LIJZU&amp;dib=eyJ2IjoiMSJ9.TtZmjQWL8le1clQ_8nQyT6DjKB34u925op481NacqdPS9YwKPpYaO9gRhfp4VyBGHJQyIXFXzwhXGacpUFSvqFogG_uXYGl9_FW98AmO_Bmw_rxcZ4ZkKqE3xjC8hAwsShZ_8wl5oQwal5BYZpjpGTaIa-ouxu3WobgO3lUH_v5JWNcaGrscoQHx13m6ymYezgD_7J7W0gM52GSzuz5A7at81Sz1rVaaSMDbSiC0klE.K6qXsIEkdhpnmx5BUJrR-akL1UP7b1rHzl0gbMYBf6g&amp;dib_tag=se&amp;keywords=network+basics+for+hackers&amp;qid=1755508236&amp;s=books&amp;sprefix=network+basics+for+hacker%2Cstripbooks-intl-ship%2C238&amp;sr=1-1">this book</a> even before the Linux basics, because I felt that this book has some really really important part of IT in general. It was really rich with content about Internet and Networks in general. It was really interesting to do practice tasks. I bough Alpha external NIC with capability of Monitor mode. Scanning networks and seeing that there are still networks “protected” with WPS was kind of disappointing. With nowadays computing power brute forcing WPS takes few hours.</p>
<p><strong>I want to clarify that I was not cracking Wi-Fis, only scanning them from outside.</strong></p>
<h3 id="heading-getting-started-becoming-a-master-hacker">Getting Started Becoming a Master Hacker</h3>
<p><a target="_blank" href="https://www.amazon.com/Getting-Started-Becoming-Master-Hacker/dp/1711729299?crid=1FJY872MHI667&amp;dib=eyJ2IjoiMSJ9.YzdFi5b1R472ibsWDU5dzV9bIJRQOWCq_O2g-lWVXbZtnjLqyPpHed0fi3oUIzorSRqOmIoMiaNmSyA5g2c4StmvcozEUltBS12lY3p65cU2of3rsKMZqJ7osZKycEHw27XvP6_G2i4ovcFgkybeBwGgHuIaQc_EhtLFJntYRJcKDKcUhg4lU0se91leiYNZiXrbHsJI7z4UNB96MPP6pDdmZ_SK650tQH0Sw27DSqY.zrDJxFVI2NG1zsCFKaxnvZ5LJuyoeOVO65BBgUTHtfY&amp;dib_tag=se&amp;keywords=Getting+started+becoming+a+master+hacker&amp;qid=1755508780&amp;s=books&amp;sprefix=getting+started+becoming+a+master+hacke%2Cstripbooks-intl-ship%2C215&amp;sr=1-1">This book</a> was kind of a desert. I had a grasp on different tools. I had a really interesting dive into the history of Hacks and cyber security in general. I really enjoyed this book. Lots of hands on practice tasks.</p>
<h3 id="heading-what-surprised-me">What surprised me?</h3>
<p>There was few topics that really surprised me.</p>
<p>One of them is RF (Radio Frequencies). It is soooo powerful and important. Long story short - everything is Radio. Wi-Fi, Bluetooth, GPS, GSM.</p>
<p>Other topic was CAN (Controller Area Network). In other words - vehicles networks. How does everything work in a vehicle. I understood how thieves are stealing vehicles and how once again RF is doing a big part in this field. It was really interesting to do a practice tasks with CAN simulator. You can literally tell a vehicle to open all of the doors and accelerate to 100km/h via terminal.</p>
<h3 id="heading-short-break">SHORT BREAK</h3>
<p>I think it is really important to give yourself time after learning big piece of information. Good sleep is your friend.</p>
<h2 id="heading-second-semester">SECOND SEMESTER</h2>
<p>After a break it was time to learn for the Security+ exam.</p>
<h3 id="heading-hackers-arise-boot-camp">Hackers-Arise Boot-camp</h3>
<p>First part was a <a target="_blank" href="https://hackers-arise.com/security-bootcamp/">boot-camp by Master OTW on Hackers-Arise</a>. As mentioned before, OTW is a really good teacher. I like that he was teaching not only the topics of exam, but he also gave real world examples of the stuff that he was teaching.</p>
<h3 id="heading-professor-messer">Professor Messer</h3>
<p>After that I wanted to dive into dry theory and mark all of the topics that I felt weak after Hackers-Arise boot-camp. <a target="_blank" href="https://www.professormesser.com/">Professor Messer is a great resource</a>.</p>
<h3 id="heading-boson-practice-exams">Boson practice exams</h3>
<p>I think one of the most important resource was <a target="_blank" href="https://www.boson.com/certification/security+">Boson Simulation Exams</a>. A really really good resource for studying and feeling how the exam looks like and how does the questions are formulated.</p>
<h3 id="heading-acronyms">Acronyms</h3>
<p>This was a tough part. There are 300+ possible acronyms in the Securtiy+ exam. First I was just grinding them, but after that I was doing other technique. I was studying the topics and trying to understand the process of different technologies (acronyms) and then they’ve just clicked.</p>
<h2 id="heading-outro">Outro</h2>
<p>Well, I could talk and write about this journey, but it is only a beginning. I am really excited for the upcoming projects. One of them is physical lab for a deeper dive into the Network, Firewall configuration, logging and important parts of Cyber Security.</p>
<p><strong>Believe in yourself and you can do anything!</strong></p>
<h4 id="heading-credits">CREDITS</h4>
<p>Huge credits and a big <strong>thank you to the</strong> Master OTW.</p>
<p>Thanks to the Professor Messer</p>
<p>A big thank you to Benjamin - my support and mastermind when times are difficult:</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1755513736070/a5545b37-cffd-4de5-aef8-46adfce01ae4.jpeg" alt class="image--center mx-auto" /></p>
<p>End of first year. Stay tuned for the future.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1755513872792/479dfe97-e499-4936-908e-71ea4c2c3431.jpeg" alt class="image--center mx-auto" /></p>
]]></content:encoded></item><item><title><![CDATA[Sec+ preparation #13 (digital forensics and incident response, awareness training, data classification)]]></title><description><![CDATA[Intro
Let’s jump into next day of preparing for SEC+.
Before beginning I just want to give credit to Master OTW at Hackers-Arise. I really enjoy how he describes concepts of various topics. Real professional.
You can purchase Security+ SY0-701 boot c...]]></description><link>https://cyberjourney.eu/sec-preparation-13-digital-forensics-and-incident-response-awareness-training-data-classification</link><guid isPermaLink="true">https://cyberjourney.eu/sec-preparation-13-digital-forensics-and-incident-response-awareness-training-data-classification</guid><category><![CDATA[learning]]></category><category><![CDATA[Learning Journey]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[CyberSec]]></category><category><![CDATA[cyber]]></category><category><![CDATA[cybr]]></category><category><![CDATA[cyber security]]></category><category><![CDATA[CybersecurityAwareness]]></category><category><![CDATA[comptia security+]]></category><category><![CDATA[comptia]]></category><category><![CDATA[Security]]></category><dc:creator><![CDATA[Jonas Satkauskas]]></dc:creator><pubDate>Tue, 10 Jun 2025 12:01:58 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1749556855933/8990ecd0-1fa9-4547-afcb-121df3a8d249.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 id="heading-intro">Intro</h2>
<p>Let’s jump into next day of preparing for SEC+.</p>
<p>Before beginning I just want to give credit to Master OTW at <a target="_blank" href="https://www.hackers-arise.com/">Hackers-Arise</a>. I really enjoy how he describes concepts of various topics. Real professional.</p>
<p>You can purchase Security+ SY0-701 boot camp <a target="_blank" href="https://hackersarise.thinkific.com/courses/security-training">here</a></p>
<h2 id="heading-digital-forensics-and-incident-response-dfir">Digital Forensics and Incident Response (DFIR)</h2>
<p>There are many types of Forensics:</p>
<ul>
<li><p>Log forensics</p>
</li>
<li><p>Registry Forensics</p>
</li>
</ul>
<h4 id="heading-important-steps">Important steps</h4>
<ul>
<li><p>Record any time offset</p>
<ul>
<li><p>It is always best to use a good time server (<strong>NTP</strong>)</p>
</li>
<li><p>It is really important to have the same time set on every device, because then you can make a timeline of event</p>
</li>
<li><p>Encrypt hashes with private key (signing). If it is hashed, then you cannot change stuff, because the hash will change.</p>
</li>
</ul>
</li>
</ul>
<h4 id="heading-ediscovery">EDiscovery</h4>
<ul>
<li><p>EDiscovery or EEvidence</p>
</li>
<li><p>Always start with the most volatile evidence first</p>
<ul>
<li><p>Cache would be the most volatile</p>
</li>
<li><p>Then you could attempt to extract data in RAM</p>
</li>
</ul>
</li>
<li><p>Take photograph</p>
</li>
<li><p>Always make a copy of evidence</p>
</li>
<li><p>Avoid contaminating the original evidence</p>
</li>
<li><p>Hard drive will be copied bit by bit (dd command in Linux)</p>
<ul>
<li>To capture deleted files, you must have a bit by bit copy of a hard-drive</li>
</ul>
</li>
<li><p>Do not use simple OS tools</p>
<ul>
<li>They do not make forensically sound copies</li>
</ul>
</li>
</ul>
<h3 id="heading-chain-of-custody">Chain of custody</h3>
<p>Before doing a forensics procedure, always copy the hash instantly.</p>
<ul>
<li><p>Always think it might be presented in court, be careful</p>
</li>
<li><p>Identification, collection, preservation, present in court</p>
</li>
</ul>
<h4 id="heading-first-responders-in-a-df-digital-forensics-case">First responders in a DF (Digital Forensics) case</h4>
<ul>
<li><p>First responder is really important</p>
</li>
<li><p>Could be a system or network admin</p>
</li>
<li><p>Attempt to find the root causes</p>
</li>
<li><p>Has to be prepared and his actions should be planned</p>
<ul>
<li>Usually has a first responder toolkit</li>
</ul>
</li>
<li><p><strong>Before you touch anything, take photographs on how it looked before touching anything.</strong></p>
</li>
</ul>
<h3 id="heading-damage-and-loss-control">Damage and loss control</h3>
<ul>
<li><p>Preparation</p>
<ul>
<li>Produce policies</li>
</ul>
</li>
<li><p>Identification</p>
</li>
<li><p>Containment</p>
<ul>
<li>Make sure that attacker cannot move further</li>
</ul>
</li>
<li><p>Eradication</p>
</li>
<li><p>Recovery</p>
</li>
<li><p>Lesson Learned</p>
</li>
</ul>
<h4 id="heading-reporting">Reporting</h4>
<ul>
<li><p>Breach law may affect you</p>
</li>
<li><p>Could affect your reputation</p>
</li>
</ul>
<p>It is really important to tell if you got hacked as an organization because it can save other companies. Usually hacks happen as domino effect in organizations.</p>
<h4 id="heading-cross-border-issues">Cross Border Issues</h4>
<ul>
<li><p>Jurisdiction is a large problem</p>
</li>
<li><p>Where do we prosecute from?</p>
<ul>
<li>If for example crime happened in Russia, through 5 different countries</li>
</ul>
</li>
<li><p>Cross Border issues also applies to people and other data</p>
<ul>
<li><p>Beware if you travel with hacking tools</p>
</li>
<li><p>Beware if you have international locations</p>
</li>
<li><p>Beware if you travel oversea with strong crypto tools</p>
</li>
</ul>
</li>
<li><p><strong>If you have laptop with Kali installed, you can become a suspect in some countries.</strong></p>
</li>
<li><p><strong>You can get laptop with KALI confiscated in some countries. It really happens</strong></p>
</li>
</ul>
<h2 id="heading-awareness-training">Awareness Training</h2>
<p>It is security awareness for end users. <strong>You cannot protect other people, but you can make them aware of what possible threats there are.</strong></p>
<h3 id="heading-awareness-should-include">Awareness should include</h3>
<p>User habits such as:</p>
<ul>
<li><p>Passwords</p>
</li>
<li><p>Data handling</p>
</li>
<li><p>Clean Desk policies</p>
</li>
<li><p>Personally owned devices</p>
</li>
</ul>
<p><strong>Modify employee behavior and improve attitudes towards information security.</strong></p>
<p>Threat awareness:</p>
<ul>
<li><p>New viruses</p>
</li>
<li><p>Phishing attacks</p>
</li>
<li><p>Social Network Dangers</p>
</li>
</ul>
<p><strong>Educate your users!</strong></p>
<h4 id="heading-easiest-target">Easiest target</h4>
<ul>
<li><p>Easiest target is usually between the chair and the desk</p>
</li>
<li><p>Beware of insider threats</p>
<ul>
<li><p>There is no patch for human stupidity</p>
</li>
<li><p>Never underestimate stupidity</p>
</li>
<li><p>Users are easily predictable</p>
</li>
</ul>
</li>
</ul>
<p>MOST EFFECTIVE WEAPONS ARE:</p>
<p><strong>Awareness, Training, Education, Policies</strong></p>
<h2 id="heading-data-classification">Data Classification</h2>
<ul>
<li><p>Allow the identification of sensitive or classified data</p>
</li>
<li><p>Each classification has its own protection requirements</p>
</li>
<li><p>Subject must have proper security clearance</p>
</li>
<li><p>Usually based on Mandatory Access Control (MAC)</p>
</li>
</ul>
<h3 id="heading-data-classification-process">Data Classification Process</h3>
<p>Classification is based on these topics:</p>
<ul>
<li><p>Value of data</p>
</li>
<li><p>Sensitivity and value of the information</p>
</li>
<li><p>Decide on Controls</p>
</li>
</ul>
<h4 id="heading-classification-criteria">Classification Criteria</h4>
<ul>
<li><p>Usefulness of data</p>
</li>
<li><p>Value</p>
</li>
<li><p>Age</p>
</li>
<li><p>The level of damage that could be caused</p>
</li>
<li><p>Effects the data has on national security</p>
</li>
<li><p>Who should be accessing this data?</p>
</li>
</ul>
<h4 id="heading-process">Process</h4>
<ul>
<li><p>Identify Data Owner</p>
</li>
<li><p>Identify Data Custodian (<strong>person who will be responsible for the data</strong>)</p>
</li>
<li><p>Develop the classification criteria based on CIA</p>
</li>
<li><p>Define Controls</p>
</li>
<li><p>Define Document exceptions</p>
</li>
<li><p>Document how to transfer custody of the data</p>
</li>
<li><p>Declassification procedures</p>
</li>
<li><p>Security awareness program</p>
</li>
</ul>
<h4 id="heading-classification-issues">Classification Issues</h4>
<ul>
<li><p>Large problem is that data gets classified but it does not get declassified</p>
</li>
<li><p>Usually forgotten about</p>
</li>
<li><p>People loose trust in data classification</p>
</li>
</ul>
<h4 id="heading-awareness-and-training">Awareness and Training</h4>
<ul>
<li><p>Train users on proper usage of classification</p>
</li>
<li><p>Attempt to keep it simple</p>
</li>
<li><p>If it is too complex, it will not be in use</p>
</li>
<li><p>KISS principle applies everywhere</p>
</li>
</ul>
<h4 id="heading-compliance-with-laws">Compliance with laws</h4>
<ul>
<li><p>Be familiar with the law</p>
</li>
<li><p>Be aware of local and national laws</p>
</li>
</ul>
<h4 id="heading-retention-policies">Retention Policies</h4>
<ul>
<li><p>You must develop Retention Policies</p>
<ul>
<li><p>What will be kept</p>
</li>
<li><p>Where it will be kept</p>
</li>
<li><p>For how long will it be kept</p>
</li>
<li><p>Who and Where will it be kept</p>
</li>
</ul>
</li>
<li><p><strong>Storage devices degrade</strong></p>
</li>
</ul>
<h2 id="heading-business-continuity-plan-bcp-amp-disaster-recovery-plan-drp">Business Continuity Plan (BCP) &amp; Disaster Recovery Plan (DRP)</h2>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1749548017106/ebacb9cc-6599-44c9-ba13-4702e54f52bb.png" alt class="image--center mx-auto" /></p>
<h3 id="heading-objectives">Objectives</h3>
<ul>
<li><p>Business Impact Analysis</p>
</li>
<li><p>Risk Management</p>
</li>
<li><p>Selecting, developing, testing and implementing recovery plans</p>
</li>
<li><p>Roles and responsibilities</p>
</li>
<li><p>Backup and offsite facilities</p>
</li>
</ul>
<h4 id="heading-bcp">BCP</h4>
<p>It ensures that your organization is still running. All of the processes still does their job.</p>
<ul>
<li><p>Think on what happens to business if disaster happens</p>
</li>
<li><p>It can affect your</p>
<ul>
<li><p>Reputation</p>
</li>
<li><p>Operations</p>
</li>
<li><p>Market Position</p>
</li>
</ul>
</li>
</ul>
<h4 id="heading-roles-and-responsibilities">Roles and Responsibilities</h4>
<p>Senior Executives:</p>
<ul>
<li><p>Consistent support and final approval of plans (<strong>will be in exam)</strong></p>
</li>
<li><p>Setting the business continuity policy</p>
</li>
<li><p>Prioritizing critical business functions</p>
</li>
<li><p>Allocating sufficient resources and personnel</p>
</li>
<li><p>Providing oversight for and approving the BCP</p>
</li>
</ul>
<p>Senior functional management:</p>
<ul>
<li><p>Develop and document maintenance and testing strategy</p>
</li>
<li><p>Identify and prioritize mission-critical systems</p>
</li>
<li><p>Monitor progress of plan development</p>
</li>
<li><p>Monitor progress of plan execution</p>
</li>
</ul>
<h3 id="heading-mean-time-to-repair-mttr-and-mean-time-between-failure-mtbf">Mean time to repair (MTTR) and Mean time between failure (MTBF)</h3>
<h4 id="heading-mttr">MTTR</h4>
<ul>
<li><p>Average time needed to repair a failure</p>
</li>
<li><p>Ability to recover quickly from a failure</p>
</li>
<li><p>Spare equipment could be useful</p>
</li>
</ul>
<h4 id="heading-mtbf">MTBF</h4>
<p>Hardrives usually have MTBF value. They test it when producing and then write how long the hardware will last.</p>
<ul>
<li><p>Average time between each failure</p>
</li>
<li><p>Amount of failure</p>
</li>
</ul>
<h3 id="heading-uninterruptible-power-supply-ups-battery">Uninterruptible Power Supply (UPS) [BATTERY]</h3>
<ul>
<li><p>Computers are connected to the UPS</p>
</li>
<li><p>Usually a large room with batteries</p>
</li>
<li><p>Must have two power inverter</p>
</li>
</ul>
<p>Standby UPS:</p>
<ul>
<li><p>Smaller UPS model</p>
</li>
<li><p>Provide energy when a power failure happen</p>
</li>
<li><p>Must consider size versus total load</p>
</li>
</ul>
<h4 id="heading-backup-generator">Backup generator</h4>
<p>Some organizations such as hospitals have backup energy generators</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1749554789466/e663a0e7-d4fb-4745-aca4-1a947bc40008.jpeg" alt class="image--center mx-auto" /></p>
<p>Some key points:</p>
<ul>
<li><p>It is essential for long term interruption</p>
</li>
<li><p>Large data centers uses these things</p>
</li>
<li><p>Must gave fuel supply for a month</p>
</li>
<li><p>Must be of proper size</p>
</li>
<li><p>It should be tested regularly</p>
</li>
</ul>
<h4 id="heading-single-point-of-failure">Single point of failure</h4>
<ul>
<li><p>Avoid any single point of failure</p>
<ul>
<li>It includes UTM (Unified Threat managemenet).</li>
</ul>
</li>
<li><p>Redundant network connections</p>
</li>
<li><p>Redundant server for critical services</p>
</li>
<li><p>Spare equipment</p>
<ul>
<li><p>Hard drive</p>
</li>
<li><p>Router</p>
</li>
<li><p>Switches</p>
</li>
</ul>
</li>
</ul>
<h3 id="heading-raid-always-on-exam">RAID (ALWAYS ON EXAM)</h3>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1749555194185/da64d834-8fd2-49cd-b71f-85cda402299e.jpeg" alt class="image--center mx-auto" /></p>
<ul>
<li><p>Redundant array of independent disks</p>
</li>
<li><p>Redundant array of inexpensive disks</p>
</li>
<li><p><strong>HARD DRIVES ARE THE WEAKEST LINK IN BUSINESS</strong></p>
</li>
<li><p>Goals could be:</p>
<ul>
<li>Increase of speed on read and write</li>
</ul>
</li>
</ul>
<p>RAID-0 - striped disk array without fault tolerance</p>
<p>RAID-1 - Mirroring &amp; Duplexing</p>
<p>RAID-5 - Block-level striping and distributed parity</p>
<p>RAID-6 - Block-level striping and dual parity - can sustain the loss of two disks</p>
<p>RAID-10 - Combo RAID-1 + RAID-0</p>
<h3 id="heading-business-impact-analysis-bia">Business Impact Analysis (BIA)</h3>
<ul>
<li><p>Helps identify and prioritize information systems</p>
</li>
<li><p>Determine mission/business functions</p>
</li>
<li><p>Determine recovery criticality</p>
</li>
<li><p>Identify resource requirements</p>
</li>
<li><p>Allow you to research other disasters</p>
</li>
</ul>
<h4 id="heading-tests-amp-recovery-exercises">Tests &amp; Recovery Exercises</h4>
<ul>
<li><p>Checlist Test</p>
</li>
<li><p>Structured Walk through Test</p>
<ul>
<li>This one is really good. It’s best remembered</li>
</ul>
</li>
<li><p>Simulation Test</p>
</li>
<li><p>Parallel Test</p>
</li>
<li><p>Full Interruption Test</p>
</li>
</ul>
<h3 id="heading-hot-warm-cold-sites">Hot, Warm, Cold sites</h3>
<ul>
<li><p>Can be owned or rented</p>
</li>
<li><p>Choice is driven by Maximum Tolerable Downtime (MTD)</p>
</li>
<li><p>Choice is also driven by money losses per minute</p>
</li>
</ul>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1749555792160/9b84a476-55e8-4673-a0b8-8f7b93ee467e.png" alt class="image--center mx-auto" /></p>
<h2 id="heading-outro">OUTRO</h2>
<p>Time flies. It was final section of the boot camp. It’s a very good feeling when you understand that the first journey of cybersecurity is close to finish.</p>
<p>Of course in cybersecurity learning never ends. I’m okay with that never ending learning journey and I can’t wait to meet all of the challenges that are waiting in this field.</p>
<h4 id="heading-whats-next">What’s next?</h4>
<p>Now I’ll start taking practice exams @Boson that I’ve purchased. I’ll start with Security+ 601, and after some additional final studying steps I’ll try the 701 practice exam (I have 2 practice exams available).</p>
<p>After that I’ll buy entry to the real CompTIA Security+ exam.</p>
<p>Keep following for thoughts about my experience in this final phase of my journey.</p>
<p>Once again, I’d like to say a BIG thank you to Master Occupy The Web. I love his teaching style. To see more courses of his, visit <a target="_blank" href="https://hackers-arise.com/">Hackers-Arise</a>.</p>
<p>Have a good one!</p>
]]></content:encoded></item><item><title><![CDATA[Sec+ preparation #12 (Risk Management, Data Leakage)]]></title><description><![CDATA[Intro
Let’s jump into next day of preparing for SEC+.
Before beginning I just want to give credit to Master OTW at Hackers-Arise. I really enjoy how he describes concepts of various topics. Real professional.
You can purchase Security+ SY0-701 boot c...]]></description><link>https://cyberjourney.eu/sec-preparation-12-risk-management-data-leakage</link><guid isPermaLink="true">https://cyberjourney.eu/sec-preparation-12-risk-management-data-leakage</guid><category><![CDATA[learning]]></category><category><![CDATA[Learning Journey]]></category><category><![CDATA[comptia security+]]></category><category><![CDATA[comptia security+ certification]]></category><category><![CDATA[Security]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[CyberSec]]></category><category><![CDATA[cybr]]></category><category><![CDATA[cyber]]></category><category><![CDATA[preparation]]></category><dc:creator><![CDATA[Jonas Satkauskas]]></dc:creator><pubDate>Mon, 09 Jun 2025 12:51:07 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1749469289297/29302697-5af8-4f2b-a44f-3d011b9921c2.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 id="heading-intro">Intro</h2>
<p>Let’s jump into next day of preparing for SEC+.</p>
<p>Before beginning I just want to give credit to Master OTW at <a target="_blank" href="https://www.hackers-arise.com/">Hackers-Arise</a>. I really enjoy how he describes concepts of various topics. Real professional.</p>
<p>You can purchase Security+ SY0-701 boot camp <a target="_blank" href="https://hackersarise.thinkific.com/courses/security-training">here</a></p>
<h2 id="heading-risk-management">Risk Management</h2>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1749469313795/bc8e8b69-fdbe-43c9-930d-c329920e7b51.jpeg" alt class="image--center mx-auto" /></p>
<h3 id="heading-threat-and-risk-analysis-tar">Threat and risk analysis (TaR)</h3>
<ul>
<li><p>Minimizing risks</p>
</li>
<li><p>What are the steps</p>
</li>
<li><p>Likelihood versus impact</p>
</li>
<li><p>SLE, ALE, ARO</p>
</li>
<li><p>Managing risks</p>
</li>
<li><p>Delphi method</p>
</li>
<li><p>Methodologies</p>
</li>
</ul>
<h4 id="heading-governance">Governance</h4>
<ul>
<li><p>Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives.</p>
</li>
<li><p>Information security is not only a technical issue .</p>
</li>
<li><p>For information security to be effective, <strong>it requires the active engagement of executive management. (could be a question)</strong></p>
</li>
</ul>
<h4 id="heading-risk-amp-risk-management">Risk &amp; Risk management</h4>
<ul>
<li><p>Risk is the probability of something happening. If you ever gambled, you know what is a probability.</p>
</li>
<li><p>What is acceptable level of probability?</p>
</li>
<li><p>Information Security (IS)</p>
</li>
</ul>
<h4 id="heading-categories-of-risk">Categories of Risk</h4>
<ul>
<li><p>Man Made</p>
</li>
<li><p>Weather related</p>
</li>
<li><p>Physical damage</p>
</li>
<li><p>Human error</p>
</li>
<li><p>Inside and outside attacks</p>
</li>
<li><p>Power Failure</p>
</li>
<li><p>Application error</p>
</li>
</ul>
<h4 id="heading-asset-amp-information-value">Asset &amp; Information Value</h4>
<ul>
<li><p>Establishing asset value</p>
</li>
<li><p>Assign Quantitative value</p>
<ul>
<li>Real and meaningful values</li>
</ul>
</li>
<li><p>Assign Qualitative value</p>
<ul>
<li><p>Subjective rating</p>
</li>
<li><p>Can be low, medium, high</p>
</li>
</ul>
</li>
</ul>
<h4 id="heading-techniques-to-minimize-risks-will-be-in-exam">Techniques to Minimize Risks (will be in exam)</h4>
<ul>
<li><p>Mandatory Vacation - workers must go on vacation regularly</p>
<ul>
<li><p>A detective mechanism</p>
</li>
<li><p>The new person might found out about anomalies such as:</p>
<ul>
<li><p>Scripts being schedule to run at regular intervals</p>
</li>
<li><p>Illegal usage of company resources</p>
</li>
<li><p>Script extracting data from the database</p>
</li>
</ul>
</li>
</ul>
</li>
<li><p>Job Rotation</p>
<ul>
<li><p>New employee may see something is wrong</p>
</li>
<li><p>Mostly done in DoD and government agencies</p>
</li>
<li><p>Not very common in commercial companies</p>
</li>
<li><p>Should be combined with mandatory vacation</p>
</li>
</ul>
</li>
<li><p>Separation of Duties (SoD)</p>
<ul>
<li><p>A method of enforcing security</p>
</li>
<li><p>One person cannot complete a critical task</p>
</li>
</ul>
</li>
<li><p>Least Privilege</p>
<ul>
<li>Applies to processes and users</li>
</ul>
</li>
</ul>
<h4 id="heading-qualitative-approach">Qualitative Approach</h4>
<ul>
<li><p>Scenario based technique, it includes:</p>
<ul>
<li><p>Brainstorming</p>
<ul>
<li>Invite greatest minds in your company and just let them talk and brainstorm</li>
</ul>
</li>
<li><p>Story boarding</p>
</li>
<li><p>Focus groups</p>
</li>
<li><p>Surveys</p>
</li>
<li><p>Questionnaires &amp; Checklist</p>
</li>
</ul>
</li>
</ul>
<h4 id="heading-quantitative-approach">Quantitative Approach</h4>
<p>Steps:</p>
<ul>
<li><p>Assign value to information and assets</p>
</li>
<li><p>Estimate potential loss per risk</p>
</li>
<li><p>Perform a threat analysis</p>
</li>
<li><p>Derive the overall loss potential per threat</p>
</li>
<li><p>Reduce, assign, or accept the risk</p>
</li>
</ul>
<h3 id="heading-main-risk-management-concepts">Main risk management concepts</h3>
<ul>
<li><p>Exposure Factor (EF)</p>
<ul>
<li>Based on likelihood (PERCENTAGE) and impact (DOLLARS/EURO)</li>
</ul>
</li>
<li><p>Single Loss Expectancy (SLE)</p>
<ul>
<li>Formula - Asset Value (AV) x Exposure Factor (EF)</li>
</ul>
</li>
<li><p>Annualized Rate of Occurrence (ARO) - <strong>hard to count</strong></p>
<ul>
<li>Estimated frequency a threat will occur within a year</li>
</ul>
</li>
<li><p>Annualized Loss Expectancy (ALE)</p>
<ul>
<li>Formula is - SLE x ARO</li>
</ul>
</li>
</ul>
<h4 id="heading-handling-risks">Handling Risks</h4>
<ul>
<li><p>Risks <strong>CAN NEVER BE TOTALLY ELIMINATED</strong></p>
<ul>
<li>There’s no risk free environment</li>
</ul>
</li>
<li><p>There are always some residual risks</p>
</li>
<li><p>What can you do about the risks you have?</p>
<ul>
<li><p>Transfer the risk (Buy insurance)</p>
</li>
<li><p>Reduce the risk</p>
</li>
<li><p>Reject/Ignore the risk</p>
</li>
<li><p>Accept the risk</p>
</li>
</ul>
</li>
</ul>
<h4 id="heading-risk-mitigation-strategies">Risk mitigation Strategies</h4>
<ul>
<li><p>Implement controls based on risks</p>
</li>
<li><p>Change Management</p>
</li>
<li><p>Incident Management</p>
</li>
<li><p>User rights and permission review</p>
<ul>
<li>Do it periodically. Make sure that people doesn’t have more permissions than they need.</li>
</ul>
</li>
<li><p>Perform routine audits</p>
</li>
</ul>
<h2 id="heading-data-leakage-amp-fraud">Data Leakage &amp; Fraud</h2>
<h3 id="heading-data-leakage-protection-dlp">Data leakage Protection (DLP)</h3>
<p>Tools to prevent unauthorized persons from being able to take away confidential information</p>
<p>Real world examples of occurrences:</p>
<ul>
<li><p>The Swedish military forgot a USB drive in a library</p>
</li>
<li><p>UK military forgot a laptop in a taxi</p>
</li>
<li><p>Barack Obama got his campaign idea stolen</p>
</li>
</ul>
<p><strong>Do not send Credit card number in clear text!!! Any sensitive information.</strong></p>
<h4 id="heading-how-does-dlp-work">How does DLP work?</h4>
<ul>
<li><p>A user send an email with sensitive data</p>
<ul>
<li>DLP analyzes it. If there’s a sensitive data it warns the user.</li>
</ul>
</li>
<li><p>User tries to save a file to a USB Flash Drive</p>
<ul>
<li>DLP identifies that it is intellectual property and blocks it. Of course there are ways to bypass that.</li>
</ul>
</li>
</ul>
<h4 id="heading-fraud-detection">Fraud Detection</h4>
<ul>
<li><p>Look for obvious sign something is wrong</p>
<ul>
<li><p>Governance is non existent</p>
</li>
<li><p>There is a lack of separation of duties</p>
</li>
<li><p>Management override internal controls</p>
</li>
<li><p>Environment is corrupted</p>
</li>
</ul>
</li>
</ul>
<h4 id="heading-what-can-i-do">What can i do?</h4>
<ul>
<li><p>Develop strong policies and enforce them</p>
</li>
<li><p>Develop a code of conduct for employees</p>
</li>
<li><p>Have a mechanism to report suspicious activity</p>
</li>
<li><p>Protect people who talk. Make them anonymous.</p>
</li>
</ul>
]]></content:encoded></item><item><title><![CDATA[Sec+ preparation #11 (cloud computing and firewalls)]]></title><description><![CDATA[Intro
Let’s jump into next day of preparing for SEC+.
Before beginning I just want to give credit to Master OTW at Hackers-Arise. I really enjoy how he describes concepts of various topics. Real professional.
You can purchase Security+ SY0-701 boot c...]]></description><link>https://cyberjourney.eu/sec-preparation-11-cloud-computing-and-firewalls</link><guid isPermaLink="true">https://cyberjourney.eu/sec-preparation-11-cloud-computing-and-firewalls</guid><category><![CDATA[learning]]></category><category><![CDATA[Learning Journey]]></category><category><![CDATA[learn]]></category><category><![CDATA[Security]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[CyberSec]]></category><category><![CDATA[cybr]]></category><category><![CDATA[cyber security]]></category><category><![CDATA[comptia security+]]></category><category><![CDATA[securityplus]]></category><dc:creator><![CDATA[Jonas Satkauskas]]></dc:creator><pubDate>Thu, 05 Jun 2025 12:20:57 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1749126008731/71fed70c-3eaf-4643-80eb-aa5b8dbd5785.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 id="heading-intro">Intro</h2>
<p>Let’s jump into next day of preparing for SEC+.</p>
<p>Before beginning I just want to give credit to Master OTW at <a target="_blank" href="https://www.hackers-arise.com/">Hackers-Arise</a>. I really enjoy how he describes concepts of various topics. Real professional.</p>
<p>You can purchase Security+ SY0-701 boot camp <a target="_blank" href="https://hackersarise.thinkific.com/courses/security-training">here</a></p>
<h3 id="heading-about-security">About Security+</h3>
<p>If you have this certification you say that you're serious about cyber security.</p>
<p>It’s challenging and very good for the beginning of career in cybersecurity.</p>
<h2 id="heading-cloud-computing">Cloud Computing</h2>
<ul>
<li><h5 id="heading-on-demand-self-service">On-demand self-service</h5>
</li>
<li><p>Broad network access</p>
<ul>
<li>Capabilities available over the network</li>
</ul>
</li>
<li><p>Resource pooling</p>
<ul>
<li><p>Flexible</p>
</li>
<li><p>Good example is Amazon <a target="_blank" href="https://aws.amazon.com/">AWS</a></p>
</li>
<li><p>Location Independence - that means that you can access it from anywhere on the planet</p>
</li>
<li><p>Customer has no control of exact location of resources</p>
</li>
<li><p>Resources could be storage, processing, memory, network bandwidth and virtual machines.</p>
</li>
</ul>
</li>
<li><p>Rapid elasticity</p>
<ul>
<li><p>In some cases automatically, to quickly scale out or in</p>
</li>
<li><p>Appears to be unlimited to the customer</p>
</li>
</ul>
</li>
<li><p>Measured service</p>
<ul>
<li><p>They keep track on how many resources you use. It can be according to storage usage, processing usage, bandwidth usage and active user accounts</p>
</li>
<li><p>Metering is usually done using pay-per-use model.</p>
</li>
<li><p>Transparency is when you know exactly for what are you being charged. Usually cloud computing does that.</p>
</li>
</ul>
</li>
</ul>
<p>Thin client - it’s a standard computer. Laptop or PC.</p>
<h3 id="heading-saas-software-as-a-service-model-this-topic-is-always-in-the-exam">SaaS (Software as a service) model (this topic is always in the exam)</h3>
<ul>
<li><p>Software resides in the cloud. People can use it.</p>
</li>
<li><p>Accessible through a thin client interface such as a browser.</p>
</li>
</ul>
<h3 id="heading-paas-platform-as-a-service">PaaS (Platform as a service)</h3>
<ul>
<li><p>Customer can deploy onto the cloud infrastructure</p>
</li>
<li><p>Only compatible apps can be deployed</p>
</li>
<li><p>Customer has control on application deployed</p>
</li>
<li><p>Customer can control hosting environment configuration</p>
</li>
</ul>
<h3 id="heading-iaas-infrastructure-as-a-service">Iaas (Infrastructure as a service)</h3>
<ul>
<li><p>Similar to a dedicated server</p>
</li>
<li><p>Customer can install an OS that he wants, also apps</p>
</li>
<li><p>Customer does not control underlying cloud infrastructure</p>
</li>
<li><p>May have limited control on network component</p>
</li>
</ul>
<p>Providers has to offer:</p>
<ul>
<li><p>Facility</p>
</li>
<li><p>Hardware</p>
</li>
<li><p>Virtualized infrastructure</p>
</li>
</ul>
<h3 id="heading-deployment-models-will-be-in-exam">Deployment models (will be in exam)</h3>
<ul>
<li><p>Private Cloud</p>
<ul>
<li><p>For one company only</p>
</li>
<li><p>May be managed by company</p>
</li>
</ul>
</li>
<li><p>Community Cloud</p>
<ul>
<li><p>Shared by multiple companies</p>
</li>
<li><p>Usually companies with shared concerns</p>
</li>
<li><p>May be managed by company</p>
</li>
<li><p>May be on premise or off premise</p>
</li>
</ul>
</li>
<li><p>Public Cloud</p>
<ul>
<li><p>Cloud is made available to general public</p>
</li>
<li><p>Cloud is available to large industry group</p>
</li>
<li><p>Cloud is owned by the organization selling cloud services</p>
</li>
<li><p>Amazon EC2 is a good example</p>
</li>
</ul>
</li>
<li><p>Hybrid cloud</p>
<ul>
<li><p>Composed of two or more clouds</p>
</li>
<li><p>Could be a mix of private, community, or public clouds</p>
</li>
<li><p>Each of the cloud are unique entities</p>
</li>
</ul>
</li>
</ul>
<h3 id="heading-cloud-computing-advantages">Cloud computing advantages</h3>
<ul>
<li><p>Qualified Staff</p>
</li>
<li><p>Platform Strength</p>
</li>
<li><p>Availability of resources</p>
</li>
<li><p>Backup and Recovery</p>
</li>
<li><p>Mobile Endpoints</p>
</li>
<li><p>Data concentration</p>
</li>
<li><p>Data Center and Cloud oriented</p>
</li>
</ul>
<p>Also an advantage that <strong>if you get hacked</strong>, vendor of the cloud will pay you, it’s their responsibility to defend your structure. They did not protect you.</p>
<h4 id="heading-disadvantages">Disadvantages</h4>
<ul>
<li><p>System complexity</p>
</li>
<li><p>Shared Multi-Tenant environment</p>
</li>
<li><p>Internet facing service</p>
<ul>
<li>All of the things are done via the web.</li>
</ul>
</li>
<li><p>Loss of control</p>
<ul>
<li><p>Lost control over physical aspects</p>
</li>
<li><p>Security and privacy can be a challenge</p>
</li>
</ul>
</li>
</ul>
<h2 id="heading-infrastructure-security">Infrastructure security</h2>
<h3 id="heading-authorization">Authorization</h3>
<ul>
<li><p>Access criteria</p>
<ul>
<li><p>Roles, groups, location, time</p>
</li>
<li><p>Transaction types</p>
</li>
</ul>
</li>
<li><p>Default to no access - that means that in the beginning you have no access and the access is gathered only when a person needs it. <strong>You start with - nobody has access to everything.</strong></p>
<ul>
<li><p>Access is explicit</p>
</li>
<li><p>Access could be implicit as well</p>
</li>
<li><p>Must fail safe</p>
</li>
</ul>
</li>
<li><p>Fail safe in the logical context is no access</p>
<ul>
<li><strong>People have access ONLY if they need it for real. This is THE SAFEST MODEL TO BUILD ORGANIZATION.</strong></li>
</ul>
</li>
<li><p>The Need to Know applies</p>
</li>
<li><p>The principle of Least privilege applies as well</p>
</li>
</ul>
<h3 id="heading-hardening-bastion-host">Hardening / Bastion Host</h3>
<p>Hardening is a process to make the system “harder”. More secure.</p>
<ul>
<li><p>Disable Unnecessary Services</p>
</li>
<li><p>Protecting Management Interfaces</p>
</li>
<li><p>Default Passwords Removed</p>
<ul>
<li>It’s a common method to get into the system</li>
</ul>
</li>
<li><p>Password Protection</p>
<ul>
<li><strong>NEVER STORE IN CLEAR TEXT</strong></li>
</ul>
</li>
<li><p><strong>PATCH</strong></p>
</li>
<li><p>Disabling unnecessary accounts</p>
</li>
<li><p>Hardening the TCP/IP Stack</p>
</li>
</ul>
<h5 id="heading-why-to-do-hardening">Why to do hardening?</h5>
<ul>
<li><p>OS’s are very insecure out of the box</p>
</li>
<li><p>Lower the amount risks</p>
</li>
<li><p>Allow only what is needed for the system role</p>
</li>
<li><p>Remove ALL non essential service</p>
</li>
<li><p>Might require some trail and errors</p>
</li>
<li><p>Will pay off in the long run</p>
</li>
</ul>
<p>Turn off the service and see what breaks.</p>
<h3 id="heading-checklist-for-saving-time">Checklist for saving time</h3>
<ul>
<li><p>Based on a consensus of experts</p>
</li>
<li><p>NIST has a <a target="_blank" href="https://ncp.nist.gov/repository">National Checklist Program</a></p>
</li>
<li><p>Security Content Automation Protocol (SCAP)</p>
<ul>
<li>Checklist are being converted to SCAP</li>
</ul>
</li>
<li><p>Can be applied to a large range of Hardware(<strong>HW</strong>) and Software(<strong>SW</strong>)</p>
</li>
</ul>
<p>Checklist are nice because you know what are the best practices. If something happens, you can say that you’ve followed best practices.</p>
<h3 id="heading-do-not-reinvent-the-wheel">Do not reinvent the wheel</h3>
<p>There are already some organizations who made checklists and needed information:</p>
<ul>
<li><p><a target="_blank" href="https://www.cisecurity.org/">The Center for Internet Security</a> - non profit organization. Has many hardening models</p>
</li>
<li><p><a target="_blank" href="https://www.nist.gov">NIST</a></p>
</li>
</ul>
<h3 id="heading-hardware-security">Hardware Security</h3>
<ul>
<li><p>Cable locks</p>
</li>
<li><p>Safe</p>
</li>
<li><p>Locking Cabinet</p>
</li>
<li><p>Vault</p>
</li>
</ul>
<h3 id="heading-host-security-on-mobile-devices">Host security on Mobile Devices</h3>
<ul>
<li><p>Screen lock</p>
</li>
<li><p>Strong password</p>
</li>
<li><p>Device encryption</p>
</li>
<li><p>Remote wiping/sanitation</p>
</li>
<li><p>Voice Encryption</p>
</li>
<li><p>GPS Tracking</p>
</li>
<li><p>Virtualization for testing to avoid host infection</p>
<ul>
<li>Good malware knows if you’re testing it in virtual system</li>
</ul>
</li>
</ul>
<h3 id="heading-firewall-topics">Firewall Topics</h3>
<ul>
<li><p>Rule Based Management</p>
<ul>
<li><p>Keep it Simple</p>
<ul>
<li>Less Rules you have, the easier it is</li>
</ul>
</li>
<li><p>You must have security policies</p>
</li>
<li><p>Convert the policies to a security architecture</p>
</li>
<li><p>Ockham's Razor (RULE) - principal that the simplest explanation is the best explanation</p>
</li>
<li><p>Rule order will greatly affect performance</p>
</li>
<li><p>Comment your rules for others to understand</p>
</li>
<li><p>Backup your rule base &amp; regularly audit</p>
</li>
</ul>
</li>
<li><p>ACL (Access Control List)</p>
<ul>
<li><p>Should be as granular(fine) as possible</p>
</li>
<li><p>Drop unwanted packets instead of Rejecting</p>
</li>
<li><p>Beware of default global properties</p>
</li>
<li><p>Allow Admin access only from trusted IP’s</p>
</li>
<li><p>Give the attacker as little information as possible</p>
</li>
<li><p>Ensure logging is properly configured</p>
</li>
<li><p>Also check what’s leaving your network</p>
</li>
</ul>
</li>
<li><p>Types of Firewalls &amp; Proxies</p>
<ul>
<li><p>Personal firewall</p>
<ul>
<li><p>Class of firewalls for users workstation</p>
</li>
<li><p>Offers protection from threats</p>
</li>
<li><p>Prevent inbound connections</p>
</li>
<li><p>Protects only one computer versus a network</p>
</li>
<li><p>Can provide integrity checking mechanisms</p>
</li>
<li><p>Allow for very detailed rule base to be created</p>
</li>
<li><p>Should be part of your baseline requirements</p>
</li>
</ul>
</li>
<li><p>Generations of enterprise firewalls</p>
<ul>
<li><p>First is Packet filters</p>
</li>
<li><p>Then proxies</p>
</li>
<li><p>Stateful Firewall</p>
</li>
</ul>
</li>
<li><p>Application Firewalls</p>
</li>
<li><p>Network Access Control (<strong>NAC)</strong> or Network Acces Protection (<strong>NAP</strong>)</p>
</li>
<li><p>NAP determines who can access the network</p>
</li>
</ul>
</li>
<li><p>Firewall</p>
<ul>
<li><p>It can be implemented in HW or SW</p>
</li>
<li><p>Enforces your security policies on traffic</p>
</li>
<li><p>Similar to a Dumb security guard</p>
</li>
<li><p>Some firewalls inspect all 7 layers of the OSI model</p>
<ul>
<li>Of course for a good price</li>
</ul>
</li>
<li><p>Controls the flow of traffic</p>
</li>
<li><p>You must understand their limitation</p>
</li>
</ul>
</li>
<li><p>What does Firewall do?</p>
<ul>
<li><p>Controls flow of traffic between networks or hosts</p>
</li>
<li><p>Restrict data flow to &amp; from the internal networks. Also from the internet</p>
</li>
<li><p>Acts as a “traffic cop”</p>
</li>
<li><p>Can provide extensive logging</p>
</li>
<li><p>Could be used as a <strong>NAT</strong> device</p>
</li>
<li><p>Can be used as a VPN device</p>
</li>
<li><p>Could be a Unified Threat Management (<strong>UTM</strong>) - that means it is a master of all trades.</p>
</li>
<li><p>New types:</p>
<ul>
<li><p>Web Application Firewall</p>
</li>
<li><p>Application Firewall</p>
</li>
</ul>
</li>
</ul>
</li>
<li><p>Network Access Control (<strong>NAC</strong>)</p>
<ul>
<li><p>Also called Network Access Protection (NAP)</p>
</li>
<li><p>A common requirement for firewalls</p>
</li>
<li><p>Inspect incoming connections</p>
</li>
<li><p>NAC Health checs</p>
<ul>
<li><p>Latest updates</p>
</li>
<li><p>Configuration settings of security tools above</p>
</li>
<li><p>Elapsed time since the previous malware scan</p>
</li>
</ul>
</li>
</ul>
</li>
<li><p>Packet Filters</p>
<ul>
<li><p>Most basic type of firewall</p>
</li>
<li><p>Filter one packet at the time</p>
</li>
<li><p>Fast &amp; Inexpensive</p>
</li>
<li><p>It is not going to tell you if the packet is malicious</p>
</li>
<li><p>Packet filters limitations</p>
<ul>
<li><p>Does not detect IP spoofing</p>
</li>
<li><p>Does not provide source authentication</p>
</li>
<li><p>Does not detect IP framentation</p>
</li>
<li><p>Does not detect strange combination of flags</p>
<ul>
<li>SYN and FIN together</li>
</ul>
</li>
</ul>
</li>
</ul>
</li>
</ul>
<ul>
<li><p>Flood guards</p>
<ul>
<li><p>Defense agains DoS or DDoS</p>
</li>
<li><p>Detects ongoing attacks</p>
</li>
<li><p>Automatically attempts to block such attacks</p>
</li>
<li><p>Checks if there are too much traffic</p>
</li>
<li><p>Can identify and attempt to stop SYN flood, Ping flood, Port flood</p>
</li>
<li><p><strong>Offering these services can make you a lot of money</strong></p>
</li>
<li><p>Tools of flood guards:</p>
<ul>
<li><p>DDoS mitigation appliances</p>
</li>
<li><p>Traffic anomaly detectors</p>
</li>
<li><p>QoS</p>
</li>
<li><p>Intrusion Prevention System</p>
</li>
<li><p>Access Control Lists (ACL)</p>
</li>
<li><p>SYN flood protection</p>
</li>
<li><p>RFC 2827 (must be complied with it)</p>
</li>
<li><p>Network Ingress Filtering</p>
</li>
<li><p>Defeating IP source Spoofing DoS attack</p>
</li>
</ul>
</li>
</ul>
</li>
<li><p>Network Segregation</p>
<ul>
<li><p>Used for SCADA systems</p>
<ul>
<li><p>Supervisory Control and Data Acquisition</p>
</li>
<li><p>Electricity, Oil and Gas Pipelines, Water utilities</p>
<ul>
<li>This is the most dangerous part in cyber warfare</li>
</ul>
</li>
</ul>
</li>
<li><p>Use by the Department of Defense (DoD)</p>
</li>
<li><p>Should be internally by companies</p>
</li>
</ul>
</li>
</ul>
<h5 id="heading-proxy-servers">Proxy Servers</h5>
<ul>
<li><p>Creates a gap between internal users &amp; public network</p>
</li>
<li><p>Act as a middle man</p>
</li>
<li><p>Still known as <strong>the most secure</strong> type of firewall</p>
</li>
<li><p>Users MUST go through the proxy</p>
</li>
<li><p><strong>Proxy is a server which inspects all of the connections.</strong></p>
</li>
</ul>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1749124127217/2fbd41ee-dbd2-4c14-95d7-d1cb5a8adc00.png" alt class="image--center mx-auto" /></p>
<h5 id="heading-application-level-proxy">Application level proxy</h5>
<ul>
<li><p>It is the smartest type of proxy</p>
</li>
<li><p>Operates at the Application Layer (7)</p>
</li>
<li><p>Understands the inner working of protocols</p>
</li>
<li><p>Understand syntax</p>
</li>
<li><p>Can be used as an access control tool</p>
<ul>
<li>May require password</li>
</ul>
</li>
</ul>
<h5 id="heading-circuit-level-proxy">Circuit Level Proxy</h5>
<ul>
<li><p>Also called Generic Proxy</p>
</li>
<li><p>Used when an application proxy cannot be used</p>
</li>
<li><p>Mostly SOCKS as a protocol today</p>
</li>
<li><p>Supported by a limited number of applications</p>
<ul>
<li><p>Browsers</p>
</li>
<li><p>Email client</p>
</li>
</ul>
</li>
<li><p>Can act as VPN</p>
</li>
</ul>
<h4 id="heading-stateful-packet-inspection-spi">Stateful Packet inspection (SPI)</h4>
<ul>
<li><p>Intercept packets at the network layer</p>
</li>
<li><p>Monitor the state of connections</p>
<ul>
<li>SYN, ACK, FIN flags</li>
</ul>
</li>
<li><p>Can enforce proper three way handshake</p>
</li>
<li><p>Can track connectionless protocols such as UDP</p>
</li>
<li><p>Fast and efficient on inbound traffic</p>
</li>
<li><p>No need to read the whole rule base</p>
</li>
<li><p>Can prevent some probes and attacks</p>
</li>
<li><p>Can restrict commands within protocols</p>
</li>
</ul>
<h4 id="heading-application-firewall">Application firewall</h4>
<ul>
<li><p>Newer trend in Stateful Packet Inspection</p>
<ul>
<li><p>AKA Deep Packet inspections</p>
</li>
<li><p>Adds basic intrusion detection to SPI</p>
</li>
</ul>
</li>
<li><p>It is next generation firewall</p>
</li>
<li><p>It’s an IDS</p>
</li>
<li><p>Inspects protocols at the application layer</p>
<ul>
<li>Allow or deny access based on how an application is running</li>
</ul>
</li>
</ul>
<h5 id="heading-web-security-gateways">Web Security Gateways</h5>
<ul>
<li><p>Newer technolgy</p>
</li>
<li><p>A for of specialized Application Firewall</p>
</li>
<li><p>Reside in front of web server</p>
</li>
<li><p>Minimize attacks through web browsers</p>
</li>
<li><p>Protect against some of the phishing attempts</p>
</li>
</ul>
<h5 id="heading-unified-threat-management-utm">Unified Threat Management (UTM)</h5>
<p>All in one Security device</p>
<ul>
<li><p>What could go wrong?</p>
</li>
<li><p>It’s a bad idea</p>
</li>
</ul>
<h4 id="heading-limitation-of-firewall-inspection">Limitation of Firewall Inspection</h4>
<ul>
<li><p>Can only work effectively on traffic they can inspect</p>
<ul>
<li><p>Cryptography hides the contents of the traffic</p>
</li>
<li><p>SSH, TLS, SSL, IPSEC</p>
</li>
</ul>
</li>
<li><p>Cannot read application data that is encrypted</p>
</li>
<li><p>Sometimes it does not understand tunneled traffic</p>
</li>
<li><p>May not be able to detect internal threats</p>
</li>
</ul>
<h4 id="heading-recommendations">Recommendations</h4>
<ul>
<li><p>NAT is a form of routing and not a type of firewall</p>
</li>
<li><p>Perform granular (very fine) Egress Filtering</p>
</li>
<li><p>Choose a firewall that blocks harmful traffic</p>
</li>
<li><p>Assess your need carefully before choosing</p>
</li>
<li><p>Management of firewalls should be centralized</p>
</li>
<li><p>Change Control must be in place</p>
</li>
<li><p>Always have backup copies of rule base</p>
</li>
</ul>
<h3 id="heading-filtering">Filtering</h3>
<ul>
<li><p>URL filtering</p>
<ul>
<li><p>User will visit malicious or offensive website</p>
</li>
<li><p>Make a whitelist of sites you can visit</p>
</li>
<li><p>You must monitor surfing habit</p>
</li>
<li><p>This is even more important in school with kids</p>
</li>
<li><p>Can filter specific categories</p>
</li>
<li><p>Can enforce policies</p>
</li>
<li><p>Tools</p>
<ul>
<li><p>Websense</p>
</li>
<li><p>SurfPatrol</p>
</li>
</ul>
</li>
</ul>
</li>
<li><p>Spam filtering</p>
</li>
<li><p>Antivirus</p>
<ul>
<li><p>Software that look for and detect viruses</p>
</li>
<li><p>Viruses distributed via:</p>
<ul>
<li><p>Files that are downloaded</p>
</li>
<li><p>Emails</p>
</li>
</ul>
</li>
<li><p>Does not understand high level attacks</p>
</li>
</ul>
</li>
<li><p>Pop-Up blocker</p>
<ul>
<li><p>Tool to prevent pop up windows from opening</p>
</li>
<li><p>Feature built within most of browsers today</p>
</li>
<li><p>Allow the user to specifically allow site popup</p>
</li>
</ul>
</li>
<li><p>Content Inspection</p>
</li>
<li><p>Malware inspection</p>
</li>
</ul>
]]></content:encoded></item><item><title><![CDATA[Sec+ preparation: First test exam]]></title><description><![CDATA[Intro
Let’s jump into next day of preparing for SEC+.
Before beginning I just want to give credit to Master OTW at Hackers-Arise. I really enjoy how he describes concepts of various topics. Real professional.
You can purchase Security+ SY0-701 boot c...]]></description><link>https://cyberjourney.eu/sec-preparation-first-test-exam</link><guid isPermaLink="true">https://cyberjourney.eu/sec-preparation-first-test-exam</guid><category><![CDATA[comptia security+]]></category><category><![CDATA[comptia]]></category><category><![CDATA[Security]]></category><category><![CDATA[securityplus]]></category><category><![CDATA[comptia security+ certification]]></category><category><![CDATA[learning]]></category><category><![CDATA[Learning Journey]]></category><dc:creator><![CDATA[Jonas Satkauskas]]></dc:creator><pubDate>Tue, 03 Jun 2025 12:17:03 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1748952980827/a01804b2-3f0f-4350-9706-9e5090ce3f61.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 id="heading-intro">Intro</h2>
<p>Let’s jump into next day of preparing for SEC+.</p>
<p>Before beginning I just want to give credit to Master OTW at <a target="_blank" href="https://www.hackers-arise.com/">Hackers-Arise</a>. I really enjoy how he describes concepts of various topics. Real professional.</p>
<p>You can purchase Security+ SY0-701 boot camp <a target="_blank" href="https://hackersarise.thinkific.com/courses/security-training">here</a></p>
<h3 id="heading-some-questions-and-answers">Some Questions and answers</h3>
<p>These questions and answers will make you undestand how CompTIA Security+ exam feels like.</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td>###Question###</td><td>###Answer###</td></tr>
</thead>
<tbody>
<tr>
<td>Which of the following options BEST describe <strong>Steganography?</strong></td><td>a method used to hide data within a file</td></tr>
<tr>
<td>Which of the following is the MOST likely motivation that drives <a target="_blank" href="https://www.cisco.com/c/en/us/products/security/what-is-shadow-it.html">shadow IT</a>?</td><td>circumventing departmental security controls</td></tr>
<tr>
<td>At the beggining of a project, the project manager is asked to prioritize individual project risks for assessment by the likelihood of their occurence. What should the project manager do?</td><td>Perform a qualitative risk analysis</td></tr>
</tbody>
</table>
</div><h3 id="heading-terminology-that-was-used">Terminology that was used</h3>
<p><strong>SLA</strong>—Service level agreement. An agreement between a company and a vendor that stipulates performance expectations, such as minimum uptime and maximum downtime levels. Organizations use SLAs when contracting services from service providers such as Internet Service Providers (ISPs).</p>
<p><strong>AUP</strong>—Acceptable use policy. A policy defining proper system usage and the rules of behavior for employees. It will often describe the purpose of computer systems and networks, how users can access them, and the responsibilities of users when accessing the systems.</p>
<p><strong>NDA</strong>—Non-disclosure agreement. An agreement that is designed to prohibit personnel from sharing proprietary data. It can be used with employees within the organization and with outside organizations. It is commonly embedded as a clause in a contract.</p>
<p><strong>MOU -</strong> (Memorandum of Understanding) is a written agreement between two or more parties that defines their working relationship, expectations, and responsibilities. While not legally binding, it serves as a formal, non-binding document outlining the parties' intentions and the scope of their collaboration</p>
<p><strong>MTBF</strong>—Mean time between failures. Provides a measure of a system’s reliability and is usually represented in hours. The MTBF identifies the average (the arithmetic mean) time between failures. Higher MTBF numbers indicate a higher reliability of a product or system.</p>
<p><strong>MTTR</strong>—Mean time to recover. Identifies the average (the arithmetic mean) time it takes to restore a failed system. Organizations that have maintenance contracts often specify the MTTR as a part of the contract.</p>
<p><strong>RPO</strong>—Recovery point objective. A term that refers to the amount of data you can afford to lose by identifying a point in time where data loss is acceptable. It is often identified in a BIA. Compare with RTO.</p>
<p><strong>RTO</strong>—Recovery time objective. The maximum amount of time it should take to restore a system after an outage. It is derived from the maximum allowable outage time identified in the BIA. Compare with RPO.</p>
<p><strong>Smishing</strong> - SMS (short message service) + phishing</p>
<p><strong>MITRE -</strong> it’s an organization which is responsible to maintain Common Vulnerabilities and Exposures (<strong>CVE</strong>) database. <strong>So vulnerabilities like CVE-2017-0143 comes from MITRE.</strong></p>
<p><strong>WAF</strong>—Web application firewall—A firewall specifically designed to protect a web application. A WAF inspects the contents of traffic to a web server, can detect malicious content such as code used in a cross-scripting attack, and block it.</p>
<p><strong>SPF -</strong> The Sender Policy Framework (SPF) is an email authentication protocol designed to prevent <a target="_blank" href="https://www.proofpoint.com/us/threat-reference/email-spoofing">email spoofing, a common tec</a>hnique used in <a target="_blank" href="https://www.proofpoint.com/us/threat-reference/phishing">phishing attacks</a> and email spam. As an integral part of email <a target="_blank" href="https://www.proofpoint.com/us/threat-reference/cybersecurity-network-security">cybersecurity, SPF enables</a> the receiving mail server to check whether incoming email comes from a domain authorized by that domain’s administrators.</p>
<p><strong>DNSSEC</strong>—Domain Name System Security Extensions. A suite of extensions to DNS used to protect the integrity of DNS records and prevent some DNS attacks.</p>
<p><strong>PCI DSS -</strong> (Payment Card Industry Data Security Standard) is a set of security standards designed to ensure the secure handling of cardholder data, including credit and debit card information. It's a globally recognized standard, mandated by major payment brands like Visa, Mastercard, and American Express, for all entities that store, process, or transmit cardholder data.</p>
<p><strong>CASB</strong>—Cloud access security broker. A software tool or service that enforces cloud-based security requirements. It is placed between the organization’s resources and the cloud, monitors all network traffic, and can enforce security policies.</p>
<p><strong>HIDS</strong>—Host-based intrusion detection system. HIDS is software installed on a system to detect attacks. A HIDS is used to monitor an individual server or workstation. It protects local resources on the host such as the operating system files, and in some cases, it can detect malicious activity missed by antivirus software. Compare with HIPS, NIDS, and NIPS.</p>
<p><strong>NIDS</strong>—Network-based intrusion detection system. A device that detects attacks and raises alerts. A NIDS is installed on network devices, such as routers or firewalls and monitors network traffic. It can detect network-based attacks.</p>
<p><strong>NIPS</strong>—Network-based intrusion prevention system. A device that detects and stops attacks in progress. A NIPS is placed inline (also called in-band) with traffic so that it can actively monitor data streams, detect malicious content, and stop attacks in progress.</p>
<p><strong>RA</strong>—Recovery agent. A designated individual who can recover or restore cryptographic keys. In the context of a PKI, a recovery agent can recover private keys to access encrypted data, or in some situations, recover the data without recovering the private key. In some cases, recovery agents can recover the private key from a key escrow.</p>
<p><strong>OCSP</strong>—Online Certificate Status Protocol. An alternative to using a CRL. It allows entities to query a CA with the serial number of a certificate. The CA answers with good, revoked, or unknown.</p>
<p><strong>CSR</strong>—Certificate signing request. A method of requesting a certificate from a CA. It starts by creating an RSA-based private/public key pair and then including the public key in the CSR. Most CAs require CSRs to be formatted using the Public-Key Cryptography Standards (PKCS) #10 specification.</p>
<p><strong>CA</strong>—Certificate Authority. An organization that manages, issues, and signs certificates and is part of a PKI. Certificates are an essential part of asymmetric encryption, and they include public keys and details on the owner of the certificate and the CA that issued the certificate. Certificate owners share their public key by sharing a copy of their certificate. Compare with PKI.</p>
<p><strong>SED</strong>—Self-encrypting drive. A drive that includes the hardware and software necessary to encrypt a hard drive. SEDs include all the encryption circuitry built into the drive, and they automatically encrypt the drive without user action. Users typically enter credentials to decrypt and use the drive. Compare with FDE.</p>
<p><strong>Elasticity -</strong> Cloud elasticity is the ability of a cloud system to rapidly scale computing resources (like CPU, memory, and storage) up or down in response to changing demand.</p>
<p><strong>PEAP</strong>—Protected Extensible Authentication Protocol. An extension of EAP sometimes used with 802.1X. PEAP provides an extra layer of protection for EAP and it is sometimes used with 802.1X. PEAP requires a certificate on the 802.1X server. Compare with EAP, EAP-TLS, EAP-TTLS, and EAP-FAST.</p>
<p><strong>IPS</strong>—Intrusion prevention system. A preventive control that can stop an attack in progress. It is similar to an active IDS except that it’s placed inline with traffic. An IPS can actively monitor data streams, detect malicious content, and stop attacks in progress. It can be used internally to protect private networks, such as those holding SCADA equipment. Compare with IDS.</p>
<p><strong>ISA -</strong> An Interconnection Security Agreement (ISA) is a document that defines the security requirements for a connection between two information systems, often between an agency and an external system.</p>
<p><strong>BCP</strong>—Business continuity plan. A plan that helps an organization predict and plan for potential outages of critical services or functions. It includes disaster recovery elements that provide the steps used to return critical functions to operation after an outage. A BIA is a part of a BCP, and the BIA drives decisions to create redundancies such as failover clusters or alternate sites. Compare with BIA and DRP.</p>
<p><strong>Table-top exercise -</strong> A tabletop exercise—or table top exercise—is <strong>an interactive, discussion-based session that prepares key team members for an emergency, disaster, or crisis</strong>.</p>
<p><a target="_blank" href="https://www.geeksforgeeks.org/zone-based-firewall/">Zone based firewalls</a>:</p>
<p><strong>1. Zone -</strong> A zone is a logical area in which the devices having the same trust levels reside. After creating a zone, an interface is assigned to a zone. By default, traffic is not allowed from one zone to another. </p>
<p>For example, first, we create a zone called inside then if the router interface fa0/0 resides on the most trusted network which we name as inside, then fa0/0 is assigned to the inside zone. </p>
<h3 id="heading-important-concepts">Important concepts</h3>
<ul>
<li><p>Data on a VPN is considered <strong>data in transit</strong>.</p>
</li>
<li><p><strong>Incremental backups</strong> are performed <strong>on weeknights.</strong> Incremental backup backs up only files that have been modified since the last full or incremental backup<strong>.</strong></p>
</li>
<li><p>All things shares the kernel.</p>
</li>
</ul>
<h2 id="heading-thoughts-after-test-exam">Thoughts after test exam</h2>
<p>There are lots of acronyms used. I think it is really important to learn as much acronyms as possible. Some of the questions includes acronyms and answers are acronyms, so it is really important to understand them.</p>
<p>Sometimes you can find part of the answer in a question itself. I felt how questions are formulated and it does not look so scary as I thought it would look. So that’s a good part.</p>
<p>I see that I must spend some time for learning acronyms.</p>
<p>Anyways, I know that I’ll be able to pass the exam.</p>
<p>Some more test exams are waiting in the future.</p>
]]></content:encoded></item><item><title><![CDATA[Sec+ preparation #10 (physical security)]]></title><description><![CDATA[Intro
Let’s jump into next day of preparing for SEC+.
Before beginning I just want to give credit to Master OTW at Hackers-Arise. I really enjoy how he describes concepts of various topics. Real professional.
You can purchase Security+ SY0-701 boot c...]]></description><link>https://cyberjourney.eu/sec-preparation-10-physical-security</link><guid isPermaLink="true">https://cyberjourney.eu/sec-preparation-10-physical-security</guid><category><![CDATA[Linux]]></category><category><![CDATA[linux for beginners]]></category><category><![CDATA[linux-basics]]></category><category><![CDATA[Security]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[CyberSec]]></category><category><![CDATA[cybr]]></category><category><![CDATA[CybersecurityAwareness]]></category><category><![CDATA[comptia security+]]></category><category><![CDATA[comptia]]></category><category><![CDATA[securityplus]]></category><dc:creator><![CDATA[Jonas Satkauskas]]></dc:creator><pubDate>Tue, 03 Jun 2025 09:17:18 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1748942095192/4a3a6926-d66e-484e-95b3-b8af2d77d758.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 id="heading-intro">Intro</h2>
<p>Let’s jump into next day of preparing for SEC+.</p>
<p>Before beginning I just want to give credit to Master OTW at <a target="_blank" href="https://www.hackers-arise.com/">Hackers-Arise</a>. I really enjoy how he describes concepts of various topics. Real professional.</p>
<p>You can purchase Security+ SY0-701 boot camp <a target="_blank" href="https://hackersarise.thinkific.com/courses/security-training">here</a></p>
<h2 id="heading-resilience-and-physical-security">Resilience and Physical Security</h2>
<p><strong>If a hacker can physically access to the physical site. It is game over. This part is really important.</strong></p>
<h3 id="heading-physical-security-ways">Physical security ways:</h3>
<ul>
<li><p>Hardware locks</p>
<ul>
<li><p>Conventional Locks</p>
<ul>
<li><p>Easily picked locks and keys easily duplicated</p>
</li>
<li><p>Control and distribution of keys can be a problem</p>
</li>
</ul>
</li>
<li><p>Pick-resistant locks</p>
<ul>
<li><p>Higher cost</p>
</li>
<li><p>Harder to pick and keys not as easily duplicated</p>
</li>
<li><p>Distribution and control still a problem</p>
</li>
</ul>
</li>
<li><p>Electronic Combination Lock</p>
<ul>
<li><p>A keypad for a combination</p>
</li>
<li><p>Also called a cipher lock (<strong>can be in exam)</strong></p>
</li>
</ul>
</li>
<li><p>Electronic key systems</p>
<ul>
<li><p>Cards encoded with access code</p>
</li>
<li><p>Magnetic cards can be duplicated or compromised</p>
</li>
<li><p>Smart Card would be a better choice</p>
<ul>
<li>RFID cards</li>
</ul>
</li>
</ul>
</li>
</ul>
</li>
<li><p>Video Surveillance</p>
<ul>
<li><p>Analyze your requirement</p>
</li>
<li><p>Estimate width of area to be monitored</p>
</li>
<li><p>Is there a need for zooming</p>
</li>
<li><p>What are the weather conditions if used outside?</p>
</li>
<li><p>How do you maintain capability?</p>
<ul>
<li>Many building shuts all light off at the end of the day. So maybe you need night vision?</li>
</ul>
</li>
<li><p>You need to protect the cameras so that it cannot be easily hacked. Intruders may see passwords entered in keypads through cameras if they are easily hackable.</p>
</li>
</ul>
</li>
<li><p>Fencing and walls</p>
<ul>
<li><p>Bollard - it prevents attack with moving object. Such as vehicle loaded with explosives</p>
<p>  Illustration of bollard:</p>
<p>  <img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1748864617681/b570cdd7-7058-4aa0-8a60-6b8a00e1038c.jpeg" alt class="image--center mx-auto" /></p>
</li>
<li><p>Fences must be a proper height</p>
<ul>
<li><p>1.5 meter height fence will deter casual trespasser</p>
</li>
<li><p>Secure areas uses 2.5+ meters height of the fence</p>
</li>
<li><p>Perimeter Intrusion Detection and Assessment System (known as PIDAS fencing)</p>
<p>  <img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1748864926866/53ff12ff-3a1f-4df5-b5f3-922305c1355d.jpeg" alt class="image--center mx-auto" /></p>
</li>
<li><p>Fences must be regularly inspected</p>
</li>
</ul>
</li>
</ul>
</li>
<li><p>Proximity Readers</p>
</li>
<li><p>Access List</p>
</li>
<li><p>Security guard</p>
<ul>
<li><p>Most efficient physical security control, but also the most expensive</p>
</li>
<li><p>Guard can enforce security policy</p>
</li>
<li><p>Can prevent Piggybacking or Tailgating attacks</p>
</li>
<li><p><strong>Guard must be well trained</strong></p>
</li>
<li><p>Can do patrols at random intervals</p>
</li>
</ul>
</li>
<li><p>Passive monitoring</p>
</li>
</ul>
<h4 id="heading-physical-access-logs">Physical access logs</h4>
<ul>
<li><p>Fortress mentality</p>
<ul>
<li><p>Check to see everybody who comes and leaves</p>
</li>
<li><p>Good method is that there is only one door through which you can come and leave</p>
</li>
</ul>
</li>
<li><p>Use logging features (check when people come and go)</p>
</li>
<li><p>Ensure guards are well trained</p>
</li>
</ul>
<h4 id="heading-id-badges">ID Badges</h4>
<ul>
<li><p>Great for authenticating users</p>
</li>
<li><p>Sometimes combines with smart cards</p>
</li>
<li><p>They are very cheap and very efficient</p>
</li>
</ul>
<h4 id="heading-door-access-systems">Door Access Systems</h4>
<ul>
<li><p>Use to control access to sensitive areas</p>
</li>
<li><p>Can be biometric or Smart Card</p>
</li>
<li><p>Based around the <a target="_blank" href="https://www.getkisi.com/guides/electronic-access-control">Electronic Access Control (EAC)</a></p>
</li>
</ul>
<h4 id="heading-physical-tokens">Physical Tokens</h4>
<ul>
<li>Type II authentication factor</li>
</ul>
<p>Could be:</p>
<ul>
<li><p>Metal Keys</p>
</li>
<li><p>Smart Card</p>
</li>
<li><p>Magnetic Card</p>
</li>
<li><p>Photo ID</p>
</li>
<li><p>Synchronous or Asynchronous tokens</p>
</li>
<li><p>Biometrics</p>
</li>
</ul>
<h4 id="heading-site-selection">Site selection</h4>
<ul>
<li><p>Select your data center location carefully</p>
</li>
<li><p>Get familiar with the building code</p>
</li>
<li><p>Investigate who are your neighbors</p>
</li>
<li><p>What is the crime rate in the area</p>
</li>
<li><p>Talk to you insurance company</p>
</li>
<li><p>What about logistics for ambulance, firefighters and stuff like that.</p>
</li>
</ul>
]]></content:encoded></item><item><title><![CDATA[Sec+ preparation #9 (access management)]]></title><description><![CDATA[Intro
Let’s jump into next day of preparing for SEC+.
Before beginning I just want to give credit to Master OTW at Hackers-Arise. I really enjoy how he describes concepts of various topics. Real professional.
You can purchase Security+ SY0-701 boot c...]]></description><link>https://cyberjourney.eu/sec-preparation-9-access-management</link><guid isPermaLink="true">https://cyberjourney.eu/sec-preparation-9-access-management</guid><category><![CDATA[learning]]></category><category><![CDATA[Learning Journey]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[CyberSec]]></category><category><![CDATA[cybr]]></category><category><![CDATA[comptia security+]]></category><category><![CDATA[comptia]]></category><category><![CDATA[access control]]></category><category><![CDATA[Access Management]]></category><dc:creator><![CDATA[Jonas Satkauskas]]></dc:creator><pubDate>Mon, 02 Jun 2025 10:49:22 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1748861238406/beb0d368-2fe3-4786-bd5f-403b525fc147.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 id="heading-intro">Intro</h2>
<p>Let’s jump into next day of preparing for SEC+.</p>
<p>Before beginning I just want to give credit to Master OTW at <a target="_blank" href="https://www.hackers-arise.com/">Hackers-Arise</a>. I really enjoy how he describes concepts of various topics. Real professional.</p>
<p>You can purchase Security+ SY0-701 boot camp <a target="_blank" href="https://hackersarise.thinkific.com/courses/security-training">here</a></p>
<h2 id="heading-identity-and-access-management">Identity and Access Management</h2>
<h3 id="heading-establish-a-baseline">Establish a baseline?</h3>
<p>It is a minimum acceptable level of security</p>
<p>Could be as simple as minimum password length</p>
<h3 id="heading-security-is-a-process-exam-emphasizes-it">Security is a process (exam emphasizes it)</h3>
<ul>
<li><p>Use the PDCA model</p>
<ul>
<li>Plan, Do, Check, Act model</li>
</ul>
</li>
<li><p>It is not a destination but a journey</p>
</li>
<li><p>New threats and vulnerabilities all the time</p>
</li>
</ul>
<p>Cybersecurity is a blessing and a curse. You must constantly learn. That’s why it is so important to love what you do.</p>
<h3 id="heading-dmz-demilitarized-zone-always-in-exam">DMZ (Demilitarized zone) (<strong>always in exam)</strong></h3>
<p>Demilitarized zone is kind of a border between friendly networks and unfriendly networks. It’s one step upper after firewall.</p>
<p>There’s demilitarized zone in for example south and north Korea. Border in the network.</p>
<p>Firewall directs traffic to internal network or to DMZ.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1748510312529/16453901-0a98-4b71-b84b-4c7f440b1104.png" alt class="image--center mx-auto" /></p>
<p>DMZ is kind of additional firewall.</p>
<h3 id="heading-identification">Identification</h3>
<ul>
<li><p>Claimed identity</p>
</li>
<li><p>Public information</p>
</li>
<li><p>Based upon first and last name</p>
</li>
<li><p>User name</p>
</li>
<li><p>User account</p>
</li>
<li><p>Employee number</p>
</li>
<li><p>There is no secret</p>
</li>
</ul>
<h3 id="heading-authentication">Authentication</h3>
<ul>
<li><p>Verifying if identification is true.</p>
</li>
<li><p>Three types:</p>
<ul>
<li><p>Authenticate by knowledge</p>
</li>
<li><p>By ownership</p>
</li>
<li><p>By characteristics</p>
</li>
</ul>
</li>
<li><p>Single factor</p>
</li>
<li><p>Two factor</p>
</li>
<li><p>Three factor</p>
</li>
</ul>
<p><strong>Multi factor authentication is when you check two types, for example knowledge (password) and characteristics (fingerprint). Multi factor means two different groups.</strong></p>
<p><strong>Two factor is when you check for example two passwords. Or two different entry cards.</strong></p>
<h3 id="heading-access-control">Access control</h3>
<ul>
<li><p>A model for developers</p>
</li>
<li><p>Look at one need or another</p>
</li>
<li><p>Use access control technologies and mechanisms</p>
</li>
</ul>
<h3 id="heading-authentication-factors">Authentication factors</h3>
<p>There’s three main ways:</p>
<ul>
<li><p>Something you know (password, pin)</p>
<ul>
<li><p>Type 1</p>
</li>
<li><p>Size is limited</p>
</li>
<li><p>Insecure storage</p>
</li>
<li><p>Operational problems</p>
<ul>
<li><p>Help desk, easy to guess</p>
</li>
<li><p>Easy to get passwords</p>
</li>
</ul>
</li>
<li><p>Physical problems</p>
<ul>
<li>Can be compromised through lack of physical security</li>
</ul>
</li>
<li><p>Hard to remember a complex pin or password.</p>
</li>
</ul>
</li>
<li><p>Something you have (card, token)</p>
<ul>
<li><p>Based on ownership</p>
</li>
<li><p>Also called type 2</p>
</li>
<li><p>Cryptographic keys or digital certificates</p>
</li>
<li><p>Smart cards</p>
</li>
<li><p>Magnetic cards</p>
</li>
<li><p>Memory cards</p>
</li>
</ul>
</li>
<li><p>Something you are (biometric)</p>
<ul>
<li><p>Based on unique physical characteristics</p>
</li>
<li><p>Type3</p>
</li>
<li><p>Sophisticated and expensive</p>
</li>
<li><p>Biometric errors</p>
<ul>
<li><p>Type1 - false reject rate (FRR)</p>
</li>
<li><p>Type2 - false accept rate (FAR)</p>
</li>
</ul>
</li>
<li><p>Accuracy</p>
<ul>
<li><p>Crossover error rate (CER)</p>
</li>
<li><p>Equal error rate (EER)</p>
</li>
<li><p><strong>The more accurate, the more errors you get.</strong></p>
</li>
</ul>
</li>
</ul>
</li>
</ul>
<p><strong>Biometric authentication is tricky because if someone steals your fingerprint, you can’t change the fingerprint.</strong></p>
<h4 id="heading-mutual-authentication">Mutual authentication</h4>
<ul>
<li><p>User and server authenticate to each other</p>
</li>
<li><p>Commonly used for:</p>
<ul>
<li><p>Private web site</p>
<ul>
<li>User must show his certificate to the web</li>
</ul>
</li>
<li><p>To authenticate to VPN device</p>
</li>
<li><p>To access to intranet</p>
</li>
</ul>
</li>
</ul>
<h3 id="heading-access-control-models-for-sure-will-be-in-sec">Access Control Models (for sure will be in Sec+)</h3>
<h4 id="heading-discretionary-access-control-dac">Discretionary Access Control (DAC)</h4>
<ul>
<li><p>Owner decides who has access</p>
</li>
<li><p>Owner manage their own files</p>
</li>
<li><p>Access is granted based on the identity of the user</p>
</li>
<li><p>Implemented through access control lists (ACL)</p>
</li>
</ul>
<p>It is adequate for low level security environment ONLY.</p>
<h4 id="heading-mandatory-access-control-mac">Mandatory access control (MAC)</h4>
<ul>
<li><p>Orange book class “B”, high security</p>
</li>
<li><p>Military uses this model</p>
</li>
<li><p>Controls are imposed by System Owner.</p>
</li>
<li><p>Based upon the sensitivity of an object</p>
</li>
<li><p>Subject must have appropriate Security Clearance</p>
</li>
<li><p>In MAC there are labels</p>
</li>
<li><p>Categories are used for the Need to Know (NDK)</p>
</li>
</ul>
<h5 id="heading-trusted-operating-systems">Trusted operating systems</h5>
<ul>
<li><p>In order to use MAC, you need secure OS</p>
</li>
<li><p>Trusted Solaris</p>
</li>
<li><p>SELinux (used by Russian military)</p>
</li>
<li><p>Root is only another user in the system</p>
</li>
</ul>
<h4 id="heading-lattice-based-access-control">Lattice Based Access Control</h4>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1748514304831/2aa5f1ca-c17b-4193-8225-077c7c0fc18e.jpeg" alt class="image--center mx-auto" /></p>
<ul>
<li><p>Use to implement MAC, File Access, Integrity levels</p>
</li>
<li><p>Use for complex access control decisions</p>
</li>
</ul>
<p>It defines:</p>
<ul>
<li><p>Greatest upper band</p>
</li>
<li><p>Least upper bound</p>
</li>
</ul>
<h4 id="heading-rule-based-access-control-rubac">Rule based Access Control (RuBAC)</h4>
<ul>
<li><p>Use to implement rules based mechanisms</p>
<ul>
<li><p>Can filter not only based on Identity</p>
</li>
<li><p>Can use IP, Protocols, Ports</p>
</li>
<li><p>More secure than DAC (Discretionary Access Control)</p>
</li>
</ul>
</li>
<li><p>Rules are applied universaly</p>
</li>
</ul>
<h4 id="heading-role-based-access-control-rbac">Role based access Control (RBAC)</h4>
<ul>
<li><p>Also called Non-Discretionary Access control</p>
</li>
<li><p>Policies are defined by the System</p>
</li>
<li><p>Distinguished from MAC</p>
</li>
<li><p>Maps well to organizational structure</p>
</li>
<li><p>Good for high turnaround of personnel</p>
</li>
<li><p>User can belong to one or many roles</p>
</li>
</ul>
<h4 id="heading-groups-and-roles">Groups and roles</h4>
<ul>
<li><p>Requires planning</p>
</li>
<li><p>Based on company mission and goals</p>
</li>
<li><p>You must analyze job tasks</p>
</li>
<li><p>Apply separation of duties</p>
</li>
<li><p>Consult the owner to determine access.</p>
</li>
</ul>
<h4 id="heading-appropriate-roles-and-permissions">Appropriate roles and permissions</h4>
<p>Three approaches:</p>
<ul>
<li><p>Centralize</p>
<ul>
<li>Single team, person, department</li>
</ul>
</li>
<li><p>Decentralize</p>
<ul>
<li>Each site has their own administrator</li>
</ul>
</li>
<li><p>Hybrid</p>
<ul>
<li><p>A mix of the two</p>
</li>
<li><p>Most commonly used</p>
</li>
</ul>
</li>
</ul>
<h4 id="heading-access-control-matrix-and-acl">Access control matrix and ACL</h4>
<p>Usually use in DAC</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1748853104582/1b286dcf-ae25-4bc8-9fd7-43f85c82643e.png" alt class="image--center mx-auto" /></p>
<h3 id="heading-password-policy">Password Policy</h3>
<ul>
<li><p>Forces to use strong password</p>
</li>
<li><p>Does not let user to choose their own password</p>
</li>
<li><p>Dictates to user:</p>
<ul>
<li><p>Password length</p>
</li>
<li><p>Type of characters</p>
</li>
</ul>
</li>
<li><p>Part of company security policies</p>
</li>
<li><p><strong>Avoid overly complex passwords because people forget it.</strong></p>
</li>
</ul>
<h4 id="heading-password-creation">Password Creation</h4>
<ul>
<li><p>You need to teach users how to construct a password</p>
</li>
<li><p><strong>All passwords should be at least 12 characters long</strong></p>
</li>
<li><p>Change password regularly</p>
</li>
<li><p>Do not allow reuse of passwords</p>
</li>
<li><p>Changing letters with numbers is called <strong>munging. Example: Hell0</strong></p>
</li>
</ul>
<h4 id="heading-protect-your-password">Protect your password</h4>
<ul>
<li><p>Memorize passwords, <strong>do not write them down</strong></p>
<ul>
<li>Writing them down makes the concept of password disappear.</li>
</ul>
</li>
<li><p>Use different password for different applications</p>
</li>
<li><p>Minimum password history should be at least 5 to 10 passwords.</p>
</li>
</ul>
<p>Password policies are stored in Local Security Policy</p>
<h4 id="heading-usernames-and-passwords">Usernames and passwords</h4>
<ul>
<li><p>Most commonly used</p>
</li>
<li><p>Used on Web Apps and Portals</p>
<ul>
<li>Should be encrypted in storage</li>
</ul>
</li>
<li><p>Should never be transmitted in clear text</p>
</li>
<li><p>Do not use simple password</p>
</li>
</ul>
<h4 id="heading-time-of-day-restriction">Time of day restriction</h4>
<ul>
<li><p>Also called Temporal access control</p>
</li>
<li><p>Access is based on time of day.</p>
</li>
<li><p><strong>These days when there are lots of ransom, you should do backups as often as possible.</strong></p>
</li>
</ul>
<h4 id="heading-account-expiration">Account expiration</h4>
<ul>
<li><p>Great for temporary worker, for example intern or contractor.</p>
</li>
<li><p>Ensure there is no dormant account</p>
</li>
<li><p>Ease system administration</p>
</li>
</ul>
<h4 id="heading-logical-tokens">Logical Tokens</h4>
<ul>
<li><p>Two categories:</p>
<ul>
<li><p>Synchronous (clock is involved)</p>
</li>
<li><p>Asynchronous (series of steps)</p>
</li>
</ul>
</li>
<li><p>Better than static password</p>
</li>
<li><p>You must educate workers on how to use them</p>
</li>
<li><p>Token is kind of like ID card.</p>
</li>
<li><p><strong>You should know about</strong>: Seed, <strong>Salt</strong>, IV, Nonce (<strong>could be in exam)</strong></p>
</li>
<li><p>Salt is added to a password to make it harder to identify your hash of the password. Same password hashes would look different because of the SALT.</p>
</li>
</ul>
<h4 id="heading-single-sign-on-sso">Single Sign-On (SSO)</h4>
<ul>
<li><p>Authenticate only once and access to all resources</p>
</li>
<li><p>Advantages:</p>
<ul>
<li><p>Requires less passwords</p>
</li>
<li><p>Authenticate once and not many times</p>
</li>
<li><p>Expires after some time</p>
</li>
</ul>
</li>
<li><p>Disadvantages:</p>
<ul>
<li><p>One key for all places</p>
</li>
<li><p>Interoperability issues</p>
</li>
<li><p>Requires significant Planning and Analysis</p>
</li>
</ul>
</li>
</ul>
<h4 id="heading-lightweight-directory-access-protocol-ldaphttpswwwtechtargetcomsearchmobilecomputingdefinitionldap"><a target="_blank" href="https://www.techtarget.com/searchmobilecomputing/definition/LDAP">Lightweight Directory Access Protocol (LDAP)</a></h4>
<ul>
<li><p>It’s a directory publishing service</p>
</li>
<li><p>Parent protocol is <a target="_blank" href="https://www.itprotoday.com/it-infrastructure/what-are-x-500-and-ldap-">X.500</a></p>
</li>
<li><p>Stores attribute based data (kind of a database)</p>
</li>
<li><p>Data generally read and not written</p>
</li>
<li><p><strong>Uses port 389 for LDAP and 636 for Secure LDAP</strong></p>
</li>
</ul>
<h4 id="heading-kerberos-sso">Kerberos (SSO)</h4>
<ul>
<li><p>Built by MIT in the 1980</p>
</li>
<li><p>Uses Symmetric Keys or Secret Keys</p>
</li>
<li><p>Key Distribution Centre (KDC) - it is unique to Kerberos</p>
<ul>
<li><p>Authentication Server (AS)</p>
</li>
<li><p>Ticket Granting Service (TGS)</p>
</li>
</ul>
</li>
<li><p>Principals</p>
<ul>
<li>Users, Services, Applications</li>
</ul>
</li>
<li><p>Uses Tickets Granting Ticket (TGT) and Tickets</p>
<ul>
<li>Tickets define on what you have acces to</li>
</ul>
</li>
</ul>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1748856342216/96060fa7-240d-48d5-b83b-21045d4c86b9.jpeg" alt class="image--center mx-auto" /></p>
<p><strong>If exam will talk about tickets it is Kerberos. (mark this)</strong></p>
<h4 id="heading-remote-authentication-dial-in-user-service-radius">Remote Authentication Dial-In User Service (RADIUS)</h4>
<ul>
<li><p>It is open source</p>
</li>
<li><p>A client/server protocol</p>
</li>
<li><p>Shared Key between client and server</p>
</li>
<li><p>Authenticate dial-in or network users</p>
</li>
<li><p>Profiles are kept in a central database</p>
</li>
<li><p>Track usage for billing</p>
</li>
<li><p>Uses the UDP</p>
</li>
</ul>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1748856663424/95a1321b-9460-45b8-82a3-c758cf922731.png" alt class="image--center mx-auto" /></p>
<h4 id="heading-terminal-access-controller-access-control-system-tacacshttpstacacsnet"><a target="_blank" href="https://tacacs.net/">Terminal Access Controller Access-Control System (TACACS+)</a></h4>
<ul>
<li><p>Service from CISCO</p>
</li>
<li><p>TACACS+ is an industry standard under <a target="_blank" href="https://www.ietf.org/process/rfcs/">RFC (Request for Comment)</a> 1492 - it’s kind of a standard</p>
</li>
<li><p>More detailed logging than RADIUS</p>
</li>
<li><p>Uses TCP <strong>(was seen in exam, keep in mind)</strong></p>
</li>
<li><p>TACACS+ improves security.</p>
</li>
<li><p>It uses LDAP in authentication phase.</p>
</li>
</ul>
<p><strong>Remember that RADIUS uses UDP and TACACS uses TCP.</strong></p>
<h4 id="heading-due-care-and-due-diligence-important-concepts">Due care and Due Diligence (important concepts)</h4>
<ul>
<li><p>Due Diligence - Do Detect</p>
<ul>
<li><p>Identifying risk</p>
</li>
<li><p>Based on best practices</p>
</li>
<li><p>For example: All computers must have antivirus.</p>
</li>
</ul>
</li>
<li><p>Due Care = Do correct</p>
<ul>
<li><p>Bringing the risk down to an acceptable level</p>
</li>
<li><p>Maintaining the risk at that lever over time</p>
</li>
<li><p>For example: Updating virus database 10 times a day</p>
</li>
</ul>
</li>
</ul>
<h4 id="heading-personal-identity-verification-piv-cards">Personal Identity Verification (PIV) Cards</h4>
<ul>
<li><p>CAC card is an example</p>
<p>  <img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1748861163986/9a8e82ff-70dc-4a58-9281-d15d284a3b63.jpeg" alt class="image--center mx-auto" /></p>
</li>
<li><p>Required for all US Government Employees</p>
</li>
<li><p>Used for secure access to computers and buildings</p>
</li>
</ul>
]]></content:encoded></item><item><title><![CDATA[Sec+ preparation #8 (standards, hashes, keys, certs)]]></title><description><![CDATA[Intro
Let’s jump into next day of preparing for SEC+.
Before beginning I just want to give credit to Master OTW at Hackers-Arise. I really enjoy how he describes data of various topics. Real professional.
You can purchase Security+ SY0-701 boot camp ...]]></description><link>https://cyberjourney.eu/sec-preparation-8-standards-hashes-keys-certs</link><guid isPermaLink="true">https://cyberjourney.eu/sec-preparation-8-standards-hashes-keys-certs</guid><category><![CDATA[learning]]></category><category><![CDATA[Learning Journey]]></category><category><![CDATA[cybr]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[CyberSec]]></category><category><![CDATA[cyber]]></category><category><![CDATA[Linux]]></category><category><![CDATA[comptia security+]]></category><category><![CDATA[comptia]]></category><category><![CDATA[comptia security+ certification]]></category><dc:creator><![CDATA[Jonas Satkauskas]]></dc:creator><pubDate>Mon, 26 May 2025 13:37:06 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1748266498044/b72af661-f71a-49a0-ac46-0a6797611bd7.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 id="heading-intro">Intro</h2>
<p>Let’s jump into next day of preparing for SEC+.</p>
<p>Before beginning I just want to give credit to Master OTW at <a target="_blank" href="https://www.hackers-arise.com/">Hackers-Arise</a>. I really enjoy how he describes data of various topics. Real professional.</p>
<p>You can purchase Security+ SY0-701 boot camp <a target="_blank" href="https://hackersarise.thinkific.com/courses/security-training">here</a></p>
<h3 id="heading-kerchoffs-principle-1883httpswwwtutorialspointcomkerckhoff-s-principle"><a target="_blank" href="https://www.tutorialspoint.com/kerckhoff-s-principle">Kerchoff’s Principle (1883)</a></h3>
<ul>
<li><p>It must not be required to be secret.</p>
<ul>
<li>Effective cryptographys algorithm must not be secret.</li>
</ul>
</li>
<li><p>Algorithm has to be publicly known</p>
</li>
<li><p>Too many secrets can lead to easier compromise</p>
</li>
<li><p>Only the key should be secret and protected</p>
</li>
</ul>
<p><strong>In OWASP TOP3 many cases are cryptographic misconfiguration</strong></p>
<p>Unknown cryptography algorithm <strong>is not more secure.</strong></p>
<h3 id="heading-hashing-algorithms-will-be-in-exam">Hashing algorithms (<strong>will be in exam</strong>)</h3>
<ul>
<li><p>SHA</p>
</li>
<li><p>SHA1 (160-bit, developed by <a target="_blank" href="https://en.wikipedia.org/wiki/National_Security_Agency">NSA</a>)</p>
<ul>
<li>160-bits <strong>(could be in exam)</strong></li>
</ul>
</li>
<li><p>SHA2 (256, 384 and 512)</p>
</li>
<li><p>MD2 (MD algorithms were developed by <a target="_blank" href="https://en.wikipedia.org/wiki/Ron_Rivest">Ron Rivest</a>)</p>
<ul>
<li>128-bit</li>
</ul>
</li>
<li><p>MD4 (128-bit)</p>
</li>
<li><p>MD5 (128-bit)</p>
<ul>
<li>128 bits</li>
</ul>
</li>
<li><p>HAVAL (Variation of MD5)</p>
</li>
<li><p>LANMAN</p>
<ul>
<li><p>Developed in 1980</p>
</li>
<li><p>Was not used very much</p>
</li>
<li><p>It is easy to hack it</p>
</li>
</ul>
</li>
<li><p>NTLM</p>
<ul>
<li><p>Sends an 8-byte challenge to the client</p>
</li>
<li><p>Client returns the challenge in encrypted form</p>
</li>
<li><p>If response is correct, client is authenticated</p>
</li>
<li><p>Optional on Windows 2000</p>
</li>
</ul>
</li>
<li><p>NTLM V2</p>
<ul>
<li><p>Offer Session Security</p>
</li>
<li><p>Encrypted with 128 bit key</p>
</li>
<li><p>You must configure servers to accept only NTLM V2</p>
</li>
<li><p>Use passwords longer than 14 characters</p>
</li>
</ul>
</li>
</ul>
<p>There are lots of old systems in the world</p>
<p>Corporations does not update systems</p>
<p>SCADA uses really old systems.</p>
<p><strong>Registry Editor is important part in Windows. It controls software behavior in the system.</strong></p>
<ul>
<li><p>Collision</p>
<ul>
<li><p>Happens with hashing algorithms</p>
</li>
<li><p>Two different inputs creates same output (hash)</p>
</li>
<li><p>MD5 today has multiple collision</p>
<ul>
<li>Less collisions means <strong>more integrity</strong></li>
</ul>
</li>
<li><p>Use SHA-1 for forensics</p>
</li>
</ul>
</li>
<li><p>The Birthday paradox (sometimes appears in exam)</p>
<ul>
<li><p>Based on probability</p>
</li>
<li><p>How many people do I need in a room to have a 50% chance that two of them have the same birthday?</p>
<ul>
<li>Answer is: 23</li>
</ul>
</li>
<li><p>It is easier to generate random messages to attempt to get a collision instead of trying all possible values.</p>
</li>
<li><p>Guessing is often better</p>
</li>
</ul>
</li>
</ul>
<p><strong>Hashes or message digest is</strong>:</p>
<ul>
<li><p>A one way function comparable to a CRC check</p>
</li>
<li><p>Usually 128-bit or 160-bit.</p>
<ul>
<li><p>160-bit looks strange.</p>
<ul>
<li>It is 128bits + 32bits</li>
</ul>
</li>
</ul>
</li>
<li><p>You can’t reverse hash. It is one-way.</p>
</li>
<li><p>Encrypted text can be as short as 3 characters or as long as 1000 characters. The hash length will be the same.</p>
</li>
<li><p>1 bit changed means hash changes. <strong>50% of hash changes when changing 1 bit!</strong></p>
</li>
<li><p>If two inputs generate same hash it’s called <strong>Collision</strong></p>
<ul>
<li><p>Here’s where integrity comes.</p>
</li>
<li><p>It’s a sign of weakness of the algorithm</p>
</li>
</ul>
</li>
<li><p>You can find hashes on you Kali system in <strong>/etc/shadow</strong></p>
</li>
</ul>
<h4 id="heading-offtopic">OFFTOPIC:</h4>
<p>Check about <a target="_blank" href="https://www.trellix.com/security-awareness/ransomware/what-is-stuxnet/">Stuxnet attack</a> (2010)</p>
<h3 id="heading-symmetric-cipher-authentication">Symmetric Cipher Authentication</h3>
<ul>
<li><p>A message authentication Code (MAC) is used</p>
</li>
<li><p>Also called a keyed Hash</p>
</li>
</ul>
<h3 id="heading-data-encryption-standard-des-will-be-in-exam">Data Encryption Standard (DES) (WILL BE IN EXAM)</h3>
<ul>
<li><p>Originally from IBM, Block Cipher</p>
</li>
<li><p>16 rounds of encryption</p>
</li>
<li><p><a target="_blank" href="https://en.wikipedia.org/wiki/Lucifer_\(cipher\)">Lucifer Algorithm</a> accepted as DES standard 1974</p>
</li>
<li><p><strong>DES and AES are standards. These are not the algorithms.</strong></p>
</li>
<li><p>Original used 48 to 128-bit key</p>
</li>
<li><p><a target="_blank" href="https://www.nist.gov/">NIST</a> - National Institute of Standards and Technologies</p>
</li>
<li><p>The key is 64 bits in it’s total lenght</p>
</li>
</ul>
<h4 id="heading-triple-des-or-3des">Triple DES or 3DES</h4>
<ul>
<li>3 X DES applied to plaintext</li>
</ul>
<h3 id="heading-rivest-shamir-adleman-rsahttpswwwtechtargetcomsearchsecuritydefinitionrsa"><a target="_blank" href="https://www.techtarget.com/searchsecurity/definition/RSA">Rivest Shamir Adleman (RSA)</a></h3>
<ul>
<li><p>Developed by Rivest, Shamir and Adleman</p>
</li>
<li><p>Patented in 1977</p>
<ul>
<li><p>Was free to use by anyone</p>
</li>
<li><p>Became the de facto standard</p>
</li>
</ul>
</li>
<li><p>Digital signatures, key distribution, encryption</p>
</li>
<li><p>Based on Difficulty of factoring large numbers</p>
</li>
<li><p>Key sizes: 512, 1024, 2048, 4096, 8192</p>
</li>
</ul>
<h3 id="heading-pretty-good-privacy-pgphttpswwwfortinetcomresourcescyberglossarypgp-encryption"><a target="_blank" href="https://www.fortinet.com/resources/cyberglossary/pgp-encryption">Pretty Good Privacy (PGP)</a></h3>
<ul>
<li><p>Developed by Phil Zimmerman</p>
</li>
<li><p>Was initially a 1024 bits cipher</p>
</li>
<li><p>Offers Email and File Encryption</p>
</li>
<li><p>Offers Drive Encryption</p>
</li>
<li><p>The Web Of Trust was initially used with PGP</p>
</li>
</ul>
<p>NSA always asks that there would be a Backdoor open for them in an algorithm. <strong>PGP refused</strong>.</p>
<h3 id="heading-eliptic-curve-cryptosystem-ecchttpswwwkeyfactorcomblogelliptic-curve-cryptography-what-is-it-how-does-it-work"><a target="_blank" href="https://www.keyfactor.com/blog/elliptic-curve-cryptography-what-is-it-how-does-it-work/">Eliptic Curve Cryptosystem (ECC)</a></h3>
<ul>
<li><p>Short Key size with same strength as large key size</p>
</li>
<li><p>Very efficient for small portable devices</p>
<ul>
<li>it is used in every portable device now.</li>
</ul>
</li>
</ul>
<h3 id="heading-advanced-encryption-standard-aeshttpswwwtechtargetcomsearchsecuritydefinitionadvanced-encryption-standard-must-know-for-the-exam"><a target="_blank" href="https://www.techtarget.com/searchsecurity/definition/Advanced-Encryption-Standard">Advanced Encryption Standard (AES)</a> - (<strong>MUST KNOW for the exam)</strong></h3>
<ul>
<li><p>Created by Vincent Rijmen and Joan Daemen (Dutch engineers)</p>
</li>
<li><p>Effective as of May 26, 2002</p>
</li>
<li><p>Block Symmetric Encryption Algorithm</p>
<ul>
<li><p>There’s stream and block symmetric</p>
</li>
<li><p>Block sizes of 128, 192, 256</p>
</li>
</ul>
</li>
<li><p>Rounds (10, 12, 14) - how many times it will go through encryption algorithm</p>
</li>
<li><p>This is <strong>World</strong> <strong>STANDARD.</strong></p>
</li>
<li><p><strong>IT IS NOT AN ALGORITHM, IT’S A STANDARD</strong></p>
</li>
</ul>
<p>NIST picks the best algorithm. <strong>Secure and fast.</strong></p>
<h3 id="heading-one-time-pad-one-time-password">One Time Pad (One Time Password)</h3>
<ul>
<li><p>Known as the unbreakable cipher</p>
<ul>
<li>If the pad is truly random or protected it is unbreakable</li>
</ul>
</li>
<li><p>No longer used today</p>
</li>
</ul>
<h3 id="heading-ssltls">SSL/TLS</h3>
<p>In the beginning nothing was encrypted,</p>
<ul>
<li><p>Secure Sockets Layer (<a target="_blank" href="https://www.digicert.com/what-is-ssl-tls-and-https">SSL</a>)</p>
<ul>
<li><p>Developed in Netscape</p>
</li>
<li><p>Protects the communication channel (Session)</p>
</li>
<li><p>Server authenticates to client</p>
</li>
<li><p>Optionally client can authenticate to server</p>
</li>
<li><p><strong>Used for secure WWW connections</strong></p>
</li>
</ul>
</li>
<li><p>Transport Layer Security (<a target="_blank" href="https://www.digicert.com/what-is-ssl-tls-and-https">TLS</a>)</p>
<ul>
<li><p>Was supposed to replaced SSL</p>
</li>
<li><p>More features than SSL</p>
</li>
</ul>
</li>
</ul>
<h3 id="heading-smime">S/MIME</h3>
<ul>
<li><p>Application-layer protocol (Layer 7 of OSI model)</p>
</li>
<li><p>Provides data integrity, confidentiality and authentication</p>
</li>
</ul>
<h3 id="heading-public-key-infrastructure-pkihttpswwwoktacomidentity-101public-key-infrastructure"><a target="_blank" href="https://www.okta.com/identity-101/public-key-infrastructure/">Public Key Infrastructure (PKI)</a></h3>
<p>Concepts that you need to be aware of:</p>
<ul>
<li><p>Recovery Agent</p>
<ul>
<li><p>A recovery agent can save you data if you loose it</p>
</li>
<li><p>No longer used,</p>
</li>
</ul>
</li>
<li><p>Public Key</p>
</li>
<li><p>Private Key</p>
</li>
<li><p>Certificate Authority (CA)</p>
<ul>
<li><p>These are the companies that issue certificates</p>
</li>
<li><p>Top level of trust</p>
</li>
<li><p>Commercial Companies:</p>
<ul>
<li><p>VeriSign</p>
</li>
<li><p>Baltimore</p>
</li>
<li><p>Thawte</p>
</li>
</ul>
</li>
<li><p>Can have sub-CA of their own</p>
</li>
<li><p>Can also be private, like:</p>
<ul>
<li><p>DoD</p>
</li>
<li><p>Microsoft</p>
</li>
<li><p>Cisco</p>
</li>
</ul>
</li>
<li><p>Must be protected at all cost</p>
</li>
</ul>
</li>
<li><p>Registration authority</p>
<ul>
<li><p>User fills a form, get certificate and gets approval or not</p>
</li>
<li><p>Identity will be attached to digital certificate</p>
</li>
</ul>
</li>
<li><p>Key escrow</p>
<ul>
<li><p>A copy of a Private key kept by the issuer</p>
</li>
<li><p>Could be clear text copies kept in a safe</p>
</li>
</ul>
</li>
<li><p><a target="_blank" href="https://www.techtarget.com/searchsecurity/definition/Certificate-Revocation-List">Certificate Revocation List</a> (CRL)</p>
<ul>
<li><p>Answers the question if certificate is still valid today?</p>
</li>
<li><p>Contains list of compromised certificates and checks if upcoming certificate is not in that list.</p>
</li>
<li><p>Mostly replaced today by <a target="_blank" href="https://www.techtarget.com/searchsecurity/definition/OCSP">OCSP</a> (Online Certificate Status Protocol)</p>
</li>
</ul>
</li>
<li><p>Trust models</p>
<ul>
<li><p>How do we know if the certificate we see is real?</p>
<ul>
<li><p>There’s a PKI model</p>
<ul>
<li>Nice Hierarchy</li>
</ul>
</li>
<li><p>There’s a Web of trust</p>
<ul>
<li>If I’m friend with you, then I’m gonna trust anybody who you trust</li>
</ul>
</li>
</ul>
</li>
</ul>
</li>
</ul>
<h4 id="heading-key-management">Key Management</h4>
<ul>
<li><p>The need for key management</p>
</li>
<li><p>CA and RA</p>
</li>
<li><p>Keys are:</p>
<ul>
<li><p>Public</p>
</li>
<li><p>Private</p>
</li>
<li><p>No trust on keys by default</p>
</li>
</ul>
</li>
<li><p>We need automated way of distributing keys</p>
</li>
<li><p>We need creation and distribution</p>
</li>
<li><p>Key length long enough for usage</p>
</li>
<li><p>Keys need to be backup or escrowed</p>
</li>
<li><p>Keys should be <strong>properly destroyed</strong></p>
</li>
</ul>
<h5 id="heading-off-topic">OFF TOPIC</h5>
<p>Mark Shuttleworth is a founder of UBUNTU. He spent lots of money on it and made it free to people. He made his billion while selling digital certificates in the beginning. He also went to the space.</p>
]]></content:encoded></item><item><title><![CDATA[Post-quantum Cryptography]]></title><description><![CDATA[Intro
Is quantum computing for the future or is it already here, in the present?
What are the dangers for technology of quantum computing for the future?
What is quantum computing?
Bits an qubits is the main difference

Bit can be only binary. It can...]]></description><link>https://cyberjourney.eu/post-quantum-cryptography</link><guid isPermaLink="true">https://cyberjourney.eu/post-quantum-cryptography</guid><category><![CDATA[quantum computing]]></category><category><![CDATA[Quantum]]></category><category><![CDATA[Quantum Algorithms]]></category><category><![CDATA[Quantum Cryptography]]></category><category><![CDATA[Cryptography]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[CyberSec]]></category><category><![CDATA[cyber]]></category><category><![CDATA[cyber security]]></category><category><![CDATA[cybr]]></category><dc:creator><![CDATA[Jonas Satkauskas]]></dc:creator><pubDate>Thu, 22 May 2025 14:52:51 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1747925497587/b852aad0-565c-48aa-8364-c9998f775e4d.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 id="heading-intro">Intro</h2>
<p>Is quantum computing for the future or is it already here, in the present?</p>
<p>What are the dangers for technology of quantum computing for the future?</p>
<h3 id="heading-what-is-quantum-computing">What is quantum computing?</h3>
<h4 id="heading-bits-an-qubits-is-the-main-difference">Bits an qubits is the main difference</h4>
<ul>
<li><p>Bit can be only binary. It can be only 0 or 1.</p>
</li>
<li><p>Qubit can be 0 and 1 at the same time (superposition).</p>
<ul>
<li>It can let you know all of the availabilities at once.</li>
</ul>
</li>
</ul>
<h4 id="heading-revolution-in-computing">Revolution in computing</h4>
<ul>
<li><p>Quantum computing gives us quantum parallel calculations. This gives us lots of speed.</p>
</li>
<li><p><a target="_blank" href="https://www.techtarget.com/whatis/definition/quantum-interference">Qantum interferention</a> let’s us reach the answer as fast as possible.</p>
</li>
<li><p>Decoheration</p>
<ul>
<li>In other words it’s instability.</li>
</ul>
</li>
</ul>
<h4 id="heading-most-powerful-computers">Most powerful computers</h4>
<ul>
<li><p>IBM CONDOR 1121(qubits) (it has the most powerful processor)</p>
</li>
<li><p>KOOK ABURRA 4158(qubits) (planning for the 2025)</p>
<ul>
<li>With this much qubits, you can crack AES126 key.</li>
</ul>
</li>
<li><p>Google Willow 103(qubits) (introduced at 2024 12 09)</p>
</li>
<li><p>IAONQ</p>
</li>
</ul>
<h4 id="heading-main-advancements-in-quantum-computing">Main advancements in quantum computing</h4>
<p>Main algorithms are:</p>
<ul>
<li><p>Shor’s algorithm</p>
<ul>
<li>It gives us ability to factor big numbers</li>
</ul>
</li>
<li><p>Grover-s algorithm</p>
<ul>
<li>Makes the search in NoSQL databases a lot faster. This algorithm can find stuff in chaos.</li>
</ul>
</li>
</ul>
<h4 id="heading-future-of-quantum-computing">Future of Quantum computing</h4>
<ul>
<li>Google wants to achieve 1 million qubits. Number is big, but Google likes big numbers.</li>
</ul>
<h4 id="heading-businesses-working-in-quantum-computing">Businesses working in Quantum Computing</h4>
<ul>
<li><p>IBM</p>
</li>
<li><p>Google</p>
</li>
<li><p>Intel</p>
</li>
<li><p>Xanadu</p>
</li>
<li><p>IonQ (First in Europe, other businesses are in USA)</p>
</li>
<li><p>Business representatives:</p>
<ul>
<li><p>Rigetti</p>
</li>
<li><p>D-Wave</p>
</li>
<li><p>Quantinuum</p>
</li>
</ul>
</li>
</ul>
<h4 id="heading-ai-quantum-computing">AI + Quantum Computing</h4>
<p>Quantum machine learning:</p>
<ul>
<li><p>It gives us lots of effectiveness and speed for calculation.</p>
</li>
<li><p>It takes low energy.</p>
</li>
</ul>
<p>Quantum neural networks:</p>
<ul>
<li>New architecture using quantum parallelism.</li>
</ul>
<p>Data Classification:</p>
<ul>
<li>A lot faster big data analysis</li>
</ul>
<h4 id="heading-synergy-potential">Synergy potential</h4>
<p>It can make faster pharmacy industry for medication foundings.</p>
<h3 id="heading-9-qubit-types">9 qubit types</h3>
<p>Businesses need to decide which type they need to use.</p>
<ul>
<li><p>Superconducting qubits</p>
</li>
<li><p>Trappen ion qubits</p>
</li>
<li><p>Photonic qubits</p>
</li>
<li><p>Spin qubits in semiconductors</p>
</li>
<li><p>Nuclear spin qubits</p>
</li>
<li><p>Neutral atom qubits</p>
</li>
<li><p>Mechanical qubits</p>
</li>
<li><p>Moleccular qubits</p>
</li>
</ul>
<h2 id="heading-cyber-security-dangers-in-quantum-era">Cyber Security dangers in quantum era</h2>
<ul>
<li><p>Shor’s algorithm can easily break RSA and ECC encryption systems.</p>
</li>
<li><p>Nowadays security standards won’t be safe anymore.</p>
</li>
<li><p>Digital signatures won’t be as safe as before.</p>
</li>
</ul>
<h3 id="heading-shors-algorithmhttpswwwclassiqioinsightsshors-algorithm-explained"><a target="_blank" href="https://www.classiq.io/insights/shors-algorithm-explained">Shor’s algorithm</a></h3>
<p>Classical computing is using mathematical calculations. Quantum computing mathematical calculations means nothing. It take seconds.</p>
<h3 id="heading-quantum-security-management">Quantum security management</h3>
<p><strong>Quantum computer can now easily brute force the password. It takes 1 second.</strong></p>
<p>Quantum computing can easily give you answers who did the attack. It basically say who is attacker. SOC/SIEM systems can be safer than ever before.</p>
<h3 id="heading-quantum-communication">Quantum Communication</h3>
<h4 id="heading-quantum-key-distribution-qkd">Quantum Key Distribution (QKD)</h4>
<ul>
<li><p>Safe cryptographic key exchange.</p>
</li>
<li><p>Europe has one satellite EAGLE-1 with QKD availability.</p>
</li>
</ul>
<p><strong>ML40 is the main algorithm for quantum security.</strong></p>
<h3 id="heading-quantum-hackers-qackerhttpwwwqackercom"><a target="_blank" href="http://www.qacker.com/">Quantum Hackers (#qacker)</a></h3>
<h3 id="heading-future-perspectives">Future Perspectives</h3>
<p>In the near feature (5 years or even earlier) the threat is real.</p>
<h2 id="heading-preparation-for-q-day-situation-now-and-our-future">Preparation for Q day: Situation now and our future</h2>
<p>This is the day when quantum computer will be <strong>powerful enough to crack asymmetric cryptography.</strong></p>
<p>We can’t wait for this day and only then start preparing. We must start to think about our security now.</p>
<p><strong>There are reports that chinese qackers already broke military-grade encryption. We do not know what they are capable of.</strong></p>
<h3 id="heading-who-should-be-interested">Who should be interested?</h3>
<p>Basically everyone who has network connection.</p>
<h3 id="heading-how-to-prepare-for-q-day">How to prepare for Q day?</h3>
<ul>
<li><p>There are new algorithms being created. Post quantum algorithms. The following algorithms are already approved:</p>
<ul>
<li><p><a target="_blank" href="https://blog.moeghifar.com/post-quantum-key-encapsulation-ml-kem-performance-benchmark-between-go-library-and-cloudflare-006df9f759e1"><strong>ML-KEM</strong></a></p>
</li>
<li><p><a target="_blank" href="https://qcve.org/blog/ml-dsa-a-new-digital-signature-standard-for-post-quantum-cryptography"><strong>ML-DSA</strong></a></p>
</li>
<li><p><strong>SLH-DSA</strong></p>
</li>
</ul>
</li>
<li><p>Technology giants already produces new Post Quantum algorithms.</p>
</li>
<li><p>There are new groups in European Union dedicated to Post Quantum Cryptography</p>
</li>
</ul>
<h3 id="heading-transition-to-post-quantum-cryptography">Transition to Post Quantum Cryptography</h3>
<p>Until 2027 European Union Countries must be ready for quantum threats. There are plans prepared for achieving this.</p>
<ul>
<li>Road to quantum security has already started. That’s the good news.</li>
</ul>
<h2 id="heading-post-quantum-cryptography-pqc-migration-inside-organizations">Post Quantum Cryptography (PQC) migration inside organizations</h2>
<p>Main quantum threats:</p>
<ul>
<li><p>Quantum computer will be capable of cracking nowadays cryptographic algorithms.</p>
</li>
<li><p>Save now - decrypt later</p>
<ul>
<li>Attackers can now keep the keys and decrypt it later.</li>
</ul>
</li>
</ul>
<h3 id="heading-first-step-cryptography-investigation-in-your-organization">First step: Cryptography investigation in your organization</h3>
<ul>
<li><p>Checking where asymmetric algorithms are used.</p>
</li>
<li><p>Talking with system admins.</p>
</li>
</ul>
<h3 id="heading-how-to-manage-founded-risks">How to manage founded risks?</h3>
<ul>
<li><p>We can check strategies on how we will do it.</p>
</li>
<li><p>Resources and budget</p>
</li>
<li><p>Decision selection</p>
</li>
<li><p>Forming new teams</p>
</li>
</ul>
<h3 id="heading-testing">Testing</h3>
<ul>
<li><p>Lab testing</p>
</li>
<li><p>It’s a really good method to check whether your strategies work or not.</p>
</li>
<li><p>You need to decide and check which PQC algorithm is best for you.</p>
</li>
</ul>
<h3 id="heading-making-it-reality">Making it reality</h3>
<ul>
<li><p>It’s a step by step process</p>
</li>
<li><p>Risk management</p>
</li>
<li><p>Minimize the disturbances</p>
</li>
<li><p>Crypto flexibility</p>
</li>
</ul>
<h3 id="heading-summary-of-migration-in-organization">Summary of migration in organization</h3>
<ul>
<li><p>It’s a step by step process</p>
</li>
<li><p>It’s a big strategical project</p>
</li>
<li><p>Team work</p>
</li>
<li><p>We have to act <strong>now</strong>!</p>
</li>
</ul>
<h2 id="heading-discussion-outcomes">Discussion outcomes</h2>
<h4 id="heading-how-to-prepare-for-quantum-computing">How to prepare for Quantum Computing?</h4>
<h5 id="heading-whats-the-most-difficult-challenge-here">What’s the most difficult challenge here?</h5>
<ul>
<li><p>Qackers are the most dangerous now.</p>
</li>
<li><p>The future of quantum computing is not the maybe, it’s guaranteed to happen.</p>
</li>
<li><p>It’s opportunity to be safer.</p>
</li>
<li><p>Education is a challenge too. How to talk with C level executives about it.</p>
</li>
<li><p>Big challenge now is psychological aspect.</p>
</li>
<li><p>Post Quantum Cryptography sounds scary…</p>
</li>
</ul>
<h5 id="heading-what-are-the-real-usage-of-quantum-computing-in-businesses">What are the real usage of quantum computing in businesses?</h5>
<ul>
<li><p>Manufacturers react differently</p>
</li>
<li><p>Make current technologies stronger</p>
</li>
<li><p>Creating PQC adaptation systems</p>
</li>
<li><p>New QKD adaptations</p>
</li>
<li><p>2035 is the year when Post Quantum Era should begin</p>
</li>
<li><p>CloudFlare has already developed some techniques for safe Software Development.</p>
</li>
<li><p>SCADA/ICS systems will face a challenge, because old controllers cannot adapt to quantum systems.</p>
</li>
<li><p>Cryptocurrency industry will have a big challenge, because cryptocurrencies are based upon algorithms.</p>
</li>
</ul>
<h5 id="heading-what-do-you-think-about-post-quantum-standardization-of-algorithms-what-does-it-means-for-the-future">What do you think about post quantum standardization of algorithms, what does it means for the future?</h5>
<ul>
<li><p>Challenge will be to test new algorithms. To make sure that the algorithm is safe.</p>
</li>
<li><p>There has to be a process which checks if the methods of creating algorithms is known.</p>
</li>
</ul>
<h5 id="heading-do-we-have-too-much-now">Do we have too much now?</h5>
<ul>
<li><p>If we want to have safe future, we need to create ecosystem for these processes.</p>
</li>
<li><p>We do not have many quantum computers. That’s the problem.</p>
</li>
<li><p>We must have infrastructure for this thing. Let’s give toys to the scientists.</p>
</li>
</ul>
<p>We must check who developed the libraries used for quantum algorithms.</p>
<h5 id="heading-how-to-do-inventory-analysis">How to do inventory analysis?</h5>
<ul>
<li><p>There should be a data manager. A person who knows where and how data are stored. Ant what is the data.</p>
</li>
<li><p>It takes time. Lots of time.</p>
</li>
<li><p>Just write what data and where you store it. Take a simple Excel file and start.</p>
</li>
</ul>
]]></content:encoded></item></channel></rss>