04/16/2024
Happy Friday #2 champions of greatness! I got 2 hours worth of study time in monday with the pomodoro method. 1 penny = 25 minutes, 1 dime = 2 hours, and 1 quarter = 8 hours, with 5 minute breaks inbetween each penny set, and a 30 minute break after 1 dime.
-This is a project I’d ideally like to do, coming out of studying for CySA+. I don’t want this to just be another cert that I gain, but also what skills i’ve learned, and how I apply what I learned to good use in a real world application. I’m still fine tuning it.. if anyone has anything they may want to add, I’m open to feedback!
Azure Honeypot: ideally with this project, I would use Azure and put a honeypot in , perhaps on a VM.. and setup alerts like with IPS/IDS (maybe like SNORT/splunk) to track it. but on the other side like a PC with kali linux, I could try to ethically infiltrate it with a payload or virus (maybe like metasploit); the honeypot tracks it.. then I would see the network traffic and Data with NMAP/wireshark, and I take that back to the “lab” (ie Qubes/Tails OS) and I experiment and see what I find there through containerization.. using malware analysis (disassembly, C++/C, etc) and such, to see what it’s capable of.. Then I would see about what I could do to harden and secure it for next time.. maybe going at it again, and seeing what vulnerabilities or lack thereof I can find (I would probably do a vulnerability scan like burp suite the first time too, to see what can be done to harden it also..) and I’d collect my findings into a report/article.
Learning from CySA+ today:
-There’s a difference between hackers and crackers, although they seem to be used interchangably, hackers are really computer enthusiasts that are really curious on how it operates, while crackers are criminal hackers, but the news has portrayed both to be bad so much throughout the years, there may not be as much clear distinction to the public about this. You have Black hat hackers (who are bad guy hackers, who are doing unauthorized things to break through) white hat hackers (which can be cybersecurity, pentesting, with permission, to break through and see what’s vulnerable, and what can be hardened and secured more) and gray hat hackers (which may go on the good or bad side, sometimes having permission, perhaps sometimes not)
-There’s unknowns, known unknowns, and more when it comes to malware and viruses, and at first, we all may not know anything about them, how they function, what the behavior is behind them.. but as we all share it more and more together as collective, we become less blind about it.. and come into the open about it, to where we can secure and put structures in place together, whether as SOC, NOC, etc.. because the more we know as a community, the more we can band together and fight it as a community for the betterment of the collective, and the world. A great example of this would be KeyTrap, and how we were close to losing the internet with a vulnerability in DNSSEC.. The internet was close to being paralyzed to a standstill for 16+ hours, but thanks to the cybersecurity community coming together and sharing their findings and knowledge, we were able to avoid that.. for who knows how long.. Unity is a powerful thing when we all come together to serve the community for a cause beyond ourselves.. and this was no different!