<?xml version="1.0" encoding="utf-8" ?><rss version="2.0" xmlns:tt="http://teletype.in/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:media="http://search.yahoo.com/mrss/"><channel><title>@cybersecurity</title><generator>teletype.in</generator><description><![CDATA[@cybersecurity]]></description><link>https://teletype.in/@cybersecurity?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=cybersecurity</link><atom:link rel="self" type="application/rss+xml" href="https://teletype.in/rss/cybersecurity?offset=0"></atom:link><atom:link rel="next" type="application/rss+xml" href="https://teletype.in/rss/cybersecurity?offset=10"></atom:link><atom:link rel="search" type="application/opensearchdescription+xml" title="Teletype" href="https://teletype.in/opensearch.xml"></atom:link><pubDate>Thu, 14 May 2026 09:15:47 GMT</pubDate><lastBuildDate>Thu, 14 May 2026 09:15:47 GMT</lastBuildDate><item><guid isPermaLink="true">https://teletype.in/@cybersecurity/C8I9AVryg</guid><link>https://teletype.in/@cybersecurity/C8I9AVryg?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=cybersecurity</link><comments>https://teletype.in/@cybersecurity/C8I9AVryg?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=cybersecurity#comments</comments><dc:creator>cybersecurity</dc:creator><title>9 Ways to Improve the Security of Your Home Computer</title><pubDate>Sat, 09 May 2020 07:58:23 GMT</pubDate><media:content medium="image" url="https://teletype.in/files/8b/f0/8bf0fda8-b0ef-46aa-b759-d13bec2212eb.png"></media:content><description><![CDATA[<img src="https://teletype.in/files/59/37/5937bf19-8615-468a-9360-eaea36cc6c88.png"></img>We all want to make our home computers more secure. As many of us are not sure where to start or who’s advice to trust, here are are some tips from a very reliable source: The Department of Homeland Security’s United States Computer Emergency Readiness Team.]]></description><content:encoded><![CDATA[
  <p>We all want to make our home computers more secure. As many of us are not sure where to start or who’s advice to trust, here are are some tips from a very reliable source: The Department of Homeland Security’s United States Computer Emergency Readiness Team.</p>
  <p>If you want to Gain In-depth Knowledge on <strong>Cyber Security</strong>, please go through this link <strong><a href="https://onlineitguru.com/cyber-security-training.html" target="_blank">Cyber Security Online Training</a></strong></p>
  <figure class="m_original">
    <img src="https://teletype.in/files/59/37/5937bf19-8615-468a-9360-eaea36cc6c88.png" width="890" />
  </figure>
  <p><strong>Connect to a Secure Network</strong><br />Although cable modems, digital subscriber lines and internet service providers offer some level of security monitoring, it’s crucial to secure your router—the first device that receives information from the Internet.</p>
  <p><strong>Enable and Configure a Firewall</strong><br />A firewall controls the flow of information between your computer and the Internet. Most modern operating systems include a firewall. In addition to the operating system’s firewall, most routers have a built-in firewall.</p>
  <p><strong>Install and Use Antivirus and Anti-spyware Software</strong><br />Many types of antivirus and anti-spyware software can detect the possible presence of malware by looking for patterns in the files or memory of your computer.</p>
  <p><strong>Remove Unnecessary Programs</strong><br />Check the software on your computer. If you don’t know what a program does and don’t use it, research it to determine whether you need it.</p>
  <p><strong>Modify Unnecessary Default Features</strong><br />Modifying unnecessary default features eliminates other opportunities for attack. Review the features that came enabled by default on your computer and disable or customize those you don’t need or plan to use.</p>
  <p><strong>Operate Under the Principle of Least Privilege</strong><br />In most instances of a malware infection, the malware can operate only under the rights of the logged-in user. To minimize the impact of malware, use a standard or restricted user account for day-to-day activities.</p>
  <p>Take your career to new heights of success with a <strong><a href="https://onlineitguru.com/cyber-security-training.html" target="_blank">Cyber Security Training</a></strong></p>
  <p><strong>Secure Your Web Browser</strong><br />Web browsers installed on new computers usually don’t have secure default settings. Securing your browser is a critical step to improving your computer’s security because an increasing number of attacks take advantage of web browsers.</p>
  <p><strong>Apply Software Updates and Enable Future Automatic Updates</strong><br />Most software vendors release updates to patch or fix vulnerabilities, flaws and weaknesses in their software. Because intruders can exploit these bugs, it is important to keep your software updated.</p>
  <p><strong>Follow Good Security Practices</strong><br />You can do some simple things to improve your computer’s security. Some of the most important are:</p>
  <ul>
    <li>Be wary of email attachments and untrusted links. Don’t open attachments or click on links unless you’re certain they’re safe, even if they come from a person you know.</li>
    <li>Use caution when providing sensitive information. Some email or web pages that appear to come from a legitimate source may actually be the work of an attacker.</li>
    <li>Create strong passwords. Only use passwords that contain eight or more characters, a variety of uppercase and lowercase letters, and at least one symbol and number.</li>
  </ul>
  <p><strong>How to Block Pop-up Adds on Your Android Devices</strong><br />A recent article in <em>PC</em> <em>Advisor</em> gives some great advice about how to block those intrusive, annoying and (if you’re using a mobile phone) potentially expensive ads.</p>
  <p><strong>Enable the Pop-up Blocker in the Android Browser</strong><br />Open up the browser. Click the three dots menu icon in the top righthand corner. Choose “Settings” from the list. Then select “Advanced” from the menu that appears. Ensure that “Block pop-ups” is enabled. You should never see a pop-up ad on your Android smartphone when you use the Android browser. You can achieve a similar result with the Chrome browser.</p>
  <p><strong>Use Chrome and Enable Data Saver</strong><br />Using Chrome — with pop-ups blocked — rather than the Android browser will in and of itself help to block some data-hogging advertising nasties.</p>
  <p>The <em>PC</em> <em>Advisor</em> article recommends that everyone enable the Data Saver option. “Data Saver compresses aspects of web pages that aren’t required on mobile devices. It offers a smoother web browsing experience and savings on your data bill as your phone no longer struggles to pull down unnecessary ads and animations.”</p>
  <p><strong>There’s Also Adblock</strong><br />You can download the Adblock Browser free from Google Play for extra help</p>

]]></content:encoded></item><item><guid isPermaLink="true">https://teletype.in/@cybersecurity/jY_T2EFWN</guid><link>https://teletype.in/@cybersecurity/jY_T2EFWN?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=cybersecurity</link><comments>https://teletype.in/@cybersecurity/jY_T2EFWN?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=cybersecurity#comments</comments><dc:creator>cybersecurity</dc:creator><title>How to Land the Best Jobs in Cyber Security [Includes Salary Data]</title><pubDate>Fri, 08 May 2020 07:57:11 GMT</pubDate><media:content medium="image" url="https://teletype.in/files/d4/42/d442faac-6b38-4abd-a015-49a7490cd724.png"></media:content><description><![CDATA[<img src="https://teletype.in/files/02/e6/02e68f86-3f3d-4a22-9879-9feb7bba4801.png"></img>For job seekers looking for high pay, job security and the option to work in any sector and in any state, the cybersecurity field is the place to be.]]></description><content:encoded><![CDATA[
  <p>For job seekers looking for high pay, job security and the option to work in any sector and in any state, the cybersecurity field is the place to be.</p>
  <figure class="m_original">
    <img src="https://teletype.in/files/02/e6/02e68f86-3f3d-4a22-9879-9feb7bba4801.png" width="700" />
  </figure>
  <p>The annual cost of cybercrime around the globe will soon reach $6 trillion annually, according to CybersecurityVentures.com. Meanwhile, the list of big-name data breach victims (from Facebook and LinkedIn to Target, Capital One, the Department of Homeland Security and countless more) continues to grow at an alarming pace.</p>
  <p>If you want to Gain In-depth Knowledge on Ethical Hacking, please go through this link <a href="https://onlineitguru.com/cyber-security-training.html" target="_blank"><strong>Cyber Security Online Training</strong></a></p>
  <p>As cyber-attacks continue to increase in volume and tenacity, with ever-changing tactics, the government and the private sector are raising the alarm. In response, there has been a sharp uptick in the demand for cybersecurity professionals across almost every sector.</p>
  <p>Due to this significant talent shortage in a critical area of national security and following the law of supply and demand, those who work in the industry can expect a high cybersecurity salary. For instance, top-level chief information security officers can command as much as $420,000 annually.</p>
  <p>So while it is clear that a job in cybersecurity has many benefits, what are some of the best cybersecurity positions and how do you land them?</p>
  <blockquote>Read on to Find more <a href="https://elearnerstech.blogspot.com/2020/02/what-is-session-hijacking.html" target="_blank"><strong>What is Session Hijacking</strong></a></blockquote>
  <h1>The Best Jobs in Cyber Security</h1>
  <h1>Information Security Analyst</h1>
  <p>This job is listed as #4 among Best Technology Jobs and #40 overall by U.S. News &amp; World Report, which cites a median salary of $95,510. The U.S. Bureau of Labor Statistics reports median pay of $98,350. In this role your main duty will be to protect sensitive information. You will create the plans and implement strategies for preventing attacks, develop policies to protect the organization against such attacks, ensure compliance of policies, monitor data access and train other employees.</p>
  <p>Estimated salary: $90,000 — $100,000</p>
  <h1>Lead Software Security Engineer</h1>
  <p>Typically tasked with leading a team of security experts, analyzing and assessing risk, developing secure software and identifying vulnerabilities, a lead software engineer can make an average annual salary well over six figures (ZipRecruiter: $127,958; Glassdoor: $146,883).</p>
  <p>Estimated salary: $125,000 — $150,000</p>
  <h1>Chief Information Security Officer (CISO)</h1>
  <p>The CISO is a senior level role in charge of developing, implementing and maintaining security processes that protect the company from threats and risk. Salaries are now topping $420,000 for top-level CISOs. CSOonline.com lists the median salary at $158,939 and the range as $140,000–$300,000.</p>
  <p>Estimated salary: $140,000 — $300,000</p>
  <h1>Security Architect</h1>
  <p>A security architect is responsible for analyzing security threats and recommending solutions to protect information and data. They may participate in the development of security hardware and software, oversee and educate staff on security policies, design security models and install VPNs, firewalls and more. Noting that 27% of employers hiring for this position request a master’s degree, Cyberseek lists an average salary of $129,000.</p>
  <p>Estimated salary: $120,000 — $190,000</p>
  <h1>Penetration Tester</h1>
  <p>Penetration testers are in charge of identifying vulnerabilities in an organization&#x27;s network. They do this through constantly probing and testing the network using various tools and software. Cyberseek.org lists the average salary for penetration and vulnerability testers at $102,000 and reports that 22% of those hiring seek an advanced degree. However, salaries can range up to $130,000, according to Mondo.com.</p>
  <p>Estimated salary: $80,000 — $130,000</p>
  <p>To get Certification In Penetration Testing, Please Go Through The Link <a href="https://onlineitguru.com/cyber-security-training.html" target="_blank"><strong>Cyber Security Training</strong></a></p>
  <h1>Information Security Crime Investigator/Forensics Expert</h1>
  <p>A forensics expert is a cybercrime-fighting Sherlock Holmes who investigates cyber attacks and tries to identify flaws in the system that allow for an attack, along with clues left by the attackers. Related job titles include Cybersecurity Forensics Analyst, Cybersecurity Incident Responder, Cyber Forensics Analyst, according to Cyberseek.org, which lists an average salary of $85,000.</p>
  <p>Estimated salary: $75,000 — $110,000.</p>
  <p>Of course, this is just a sampling of some of the many great jobs in the cybersecurity field.</p>
  <h1>How to Get Hired</h1>
  <p>Overall, cybersecurity job openings are “skyrocketing,” according to ZipRecruiter.com. However, while there is a desperate need in the marketplace for cybersecurity professionals, employers are grappling with a serious shortage of applicants who possess the needed skills and experience to fill these positions.</p>
  <p>That means that if you want to land a job in cybersecurity, including the jobs listed above, you will likely need a combination of experience, education and industry certifications.</p>
  <h1>Certifications</h1>
  <p>If you already work in the field of cybersecurity, you know how important certifications can be. While they are certainly not the end all be all, and will not land you a job on their own, they carry a lot of weight, are definite resume boosters and are sometimes required for employment. Important certifications that those looking to make a career in cybersecurity should consider obtaining include:</p>
  <ul>
    <li>CISSP — The Certified Information Systems Security Professional. One of the leading cybersecurity certifications, the CISSP helps open the door to higher-level positions and the potential for increased pay. It is required for many key jobs at the Department of Defense, and carries a lot of weight beyond the DoD as well.</li>
    <li>CISM — Certified Information Security Manager. This certification focuses on governance, risk management and compliance.</li>
    <li>CISA — Certified Information Systems Auditor. This certification focuses on auditing, controlling, monitoring and assessing information systems and can add a significant pay boost to a cybersecurity professional’s annual salary.</li>
    <li>GIAC — Global Information Assurance Certification. This certification focuses on specialty hands-on technical capabilities such as intrusion detection and forensics among others.</li>
    <li>CEH — Certified Ethical Hacker. For entry-level applicants, a CEH certification can be a great way to land your first job or get you into an entry-level position at your top choice company. To know more, see <strong><a href="https://onlineitguru.com/cyber-security-training.html" target="_blank">Cyber Security Course</a></strong></li>
  </ul>
  <h1>Experience</h1>
  <p>Experience in the cybersecurity field is invaluable. Without experience, even landing an entry-level job will be difficult. That’s why it is important to take advantage of internship opportunities while obtaining your bachelor’s or master’s degree so that you are prepared for jobs upon graduation. To get hired at a higher level in the cybersecurity field it is typical that employers will be looking for multiple years of experience.</p>
  <p>Additionally, in the constantly changing field of cybersecurity it is imperative for cyber professionals to stay up to date on the latest in cybercrime. Lifelong learning and constant inquiry and vigilance are paramount for staying relevant and in demand in the cybersecurity field.</p>
  <h1>Education</h1>
  <p>To land a top job in cybersecurity, education is key. While a bachelor’s degree in a related field is required for most cybersecurity positions from entry-level on up, those who aspire to the highest levels of cybersecurity and hope to have a long career in the profession should strongly consider a master’s degree. Cybersecurity master degree programs give students additional technical and theoretical skills and, depending on the program, can offer the leadership, managerial and business skills required in high-level positions. Popular degree programs that those interested in a cybersecurity career often consider include:</p>
  <ul>
    <li>MS in Cyber Security Operations and Leadership</li>
    <li>MS in Cybersecurity Engineering</li>
    <li>MS in Computer Science</li>
    <li>MS in Computer Engineering</li>
    <li>MS in Information Assurance</li>
    <li>MS in Information Technology</li>
    <li>MBA (with specialty)</li>
  </ul>
  <p>Of course, choosing which program is right for you depends upon your ultimate career goals and aspirations.</p>

]]></content:encoded></item><item><guid isPermaLink="true">https://teletype.in/@cybersecurity/cByy1hB-f</guid><link>https://teletype.in/@cybersecurity/cByy1hB-f?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=cybersecurity</link><comments>https://teletype.in/@cybersecurity/cByy1hB-f?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=cybersecurity#comments</comments><dc:creator>cybersecurity</dc:creator><title>The Power of Reverse Engineering in Cyber Security</title><pubDate>Thu, 07 May 2020 08:38:40 GMT</pubDate><media:content medium="image" url="https://teletype.in/files/74/3b/743bb7b4-2bc6-42b2-8a10-b092276a955f.png"></media:content><description><![CDATA[<img src="https://teletype.in/files/09/5b/095be6d4-77cd-4fe8-be19-f47902d3afb3.png"></img>Reverse engineering is a powerful tool for any software developer. But as with any tool, it’s only as good as the person using it. Understanding reverse engineering and how it can be used is important for new and veteran developers alike. See Previous Article At Cyber Security Online Training]]></description><content:encoded><![CDATA[
  <p>Reverse engineering is a powerful tool for any software developer. But as with any tool, it’s only as good as the person using it. Understanding reverse engineering and how it can be used is important for new and veteran developers alike. See Previous Article At <strong><a href="https://onlineitguru.com/cyber-security-training.html" target="_blank">Cyber Security Online Training</a></strong></p>
  <h2>What Is Reverse Engineering?</h2>
  <p>Reverse engineering is the process of taking something apart and putting it back together again opens in new window in order to see how it works. It’s not a technique specific to computer science; instead, it can be used any time someone wants to understand a process or project. </p>
  <p>If you want to Gain In-depth Knowledge on <strong>Cyber Security</strong>, please go through this link <strong><a href="https://onlineitguru.com/cyber-security-training.html" target="_blank">Cyber Security Online Course</a></strong></p>
  <p>For example, structural engineers used reverse engineering opens in new window to determine the cause of the 1981 Hyatt Regency walkway collapse in Kansas City. Scientists often use reverse engineering too; the Human Genome Project is perhaps the most famous example of scientific reverse engineering opens in new window, wherein scientists try to decipher human DNA to learn more about how we work as a species.</p>
  <figure class="m_original">
    <img src="https://teletype.in/files/09/5b/095be6d4-77cd-4fe8-be19-f47902d3afb3.png" width="650" />
    <figcaption>The Power of Reverse Engineering in Cyber Security</figcaption>
  </figure>
  <p>When applied to software development, reverse engineering usually means using a tool called a decompiler to translate machine code into a programming language opens in new window like Java or C#, so that a developer can study the code and learn how it works. As a tool for someone learning to program, this is invaluable; studying code from existing software can help beginners learn how different pieces of code interact with each other, how programming languages are often used and how a developer can use code to create a finished product.</p>
  <h3>Ways Reverse Engineering Is Used</h3>
  <h4><strong>Product and Process Improvement</strong></h4>
  <p>Many software developers use reverse engineering to improve their own code or to improve interoperability between programs. Many software suites have application programming interfaces (APIs) that allow for interoperability. “But experts say most APIs are so poorly written that third-party software makers have little choice but to reverse-engineer the programs with which they want their software to work opens in new window, just to ensure compatibility,” according to Mathew Schwartz of <em>Computerworld</em>.</p>
  <p>Schwartz goes on to describe how Cyrix Corp. and Advanced Micro Devices Inc. managed to reverse-engineer Intel’s microprocessors to bring a less expensive, competitive product to market. While operating systems are usually too large and complex to reverse-engineer, “applications are ripe for reverse-engineering.”</p>
  <h4><strong>Cybersecurity</strong></h4>
  <p>Reverse-engineering viruses and other malware is common practice for companies that develop security software. According to a study by Zeltser Security Corp, “repeatable forensics steps should assist members of the defense community in developing a structured approach to understanding inner-workings of malicious software opens in new window.” By taking a piece of malware apart and studying it, a cybersecurity company can develop tools to combat the techniques used by malware developers, rather than reactively developing defenses for individual malware programs.</p>
  <blockquote>Take your career to new heights of success with an<a href="https://onlineitguru.com/cyber-security-training.html" target="_blank"> <strong>Cyber Security Training</strong></a></blockquote>
  <p>Reverse engineering is also used to find security flaws in software, Schwartz says. Though some companies use this to create defenses against such security flaws, hackers who create malicious software can use this process to find gaps in security that they can exploit.</p>
  <h4><strong>Intelligence and Espionage</strong></h4>
  <p>Cyber warfare is becoming an increasingly important threat to guard against; in 2014 alone, the U.S. government suffered 61,000 cybersecurity breaches opens in new window, according to <em>Time</em>. In fact, the Economic Espionage Act of 1996 specifically addresses reverse engineering opens in new window and its legality and uses. As countries become more reliant on computer systems for warfare, commerce and more, they become increasingly vulnerable to those who reverse-engineer systems to find security holes to exploit.</p>
  <h3>Is Reverse Engineering Legal?</h3>
  <p>There is no general-purpose law against reverse engineering. That is, the practice of reverse engineering in and of itself is legal. However, “reverse engineering has been under siege opens in new window in the past few decades,” according to <em>The Yale Law Journal</em>. Although nothing in the Economic Espionage Act explicitly forbids reverse engineering, there are a number of legal and ethical concerns that arise.</p>
  <p>The Electronic Frontier Foundation (EFF) lists the following areas of U.S. law as being applicable to those practicing reverse engineering opens in new window:</p>
  <ul>
    <li>Copyright and fair use law</li>
    <li>Trade secret law</li>
    <li>Anti-circumvention provisions listed in the Digital Millennium Copyright Act (DMCA)</li>
    <li>Contract law</li>
    <li>The Electronic Communications Privacy Act (ECPA)</li>
  </ul>
  <p>Copyright law presents an obstacle because most software is the intellectual property of the company that created it. Using any portion of the reverse-engineered code could constitute a copyright violation. Even if a developer doesn’t actually use the code, using lessons learned from reverse-engineered code could constitute the use of protected trade secrets or might be considered a violation of a contract such as a non-disclosure agreement.</p>
  <p>The DMCA confuses matters further, prohibiting the use of reverse engineering to circumvent “technological protection measures.” While this is often taken to mean digital rights management protection, many argue that it could just as easily refer to “techniques such as authentication handshakes, code signing, code obfuscation, and protocol encryption,” the EFF says.</p>
  <p>Finally, the ECPA prohibits the “interception of electronic communications flowing over a network.” This can include network packets, so any reverse engineering of such packets could be a violation of the ECPA unless consent is obtained from all relevant parties.</p>
  <h3>Reverse Engineering Tools</h3>
  <p>Because reverse engineering can be an invaluable tool for learning how to use a particular programming language or how to work on a particular type of application, beginners can use the technique to improve their skills. That said, it’s necessary to have some knowledge of the language that the program is written in, and other knowledge might be required for different types of applications. For example, a developer reverse-engineering crypto algorithms opens in new window will need knowledge of crypto science and should also be familiar with the most popular algorithms used in the field, according to Apriorit<em>.</em></p>
  <p>Specialized tools are also necessary. Anyone engaging in reverse engineering will need a decompiler or dissembler, a program “that translates the executable file to the assembly language,” Apriorit says<em>.</em> Other tools might also be useful or necessary, such as an API monitor or debugging tool.</p>
  <p>A junior developer intending to use reverse engineering as a learning tool would be well-served by starting with older software opens in new window. “Software is only getting more complicated, not less. So if you are in the beginning stages it is a lot harder starting with a newer piece of software,” Security-FAQs says. In addition, others have reverse-engineered older software in the past and documented the experience online, meaning that there is an existing knowledge base and community to call on that wouldn’t exist for a newer piece of software.</p>
  <p>When reverse-engineering, developers should always keep in mind the legal and ethical risks associated with doing so and strive to avoid doing anything illegal.</p>
  <h3>Learn to Be a Developer</h3>
  <p>Solid knowledge of a programming language is necessary to the reverse-engineering process. The Software Guild offers a 12-week full-time program or a nine-month part-time online program, so you can learn a programming language with the help of skilled instructors at a pace that works for your life. Upon completion, you’ll be prepared for junior developer positions in either Java or C#/.NET. Apply to the coding bootcamp today.</p>
  <p>While reverse engineering serves as a valuable introduction to software development, coding bootcamps such as The Software Guild offer an outcomes-focused, intensive learning environment for those interested in programming careers.</p>

]]></content:encoded></item><item><guid isPermaLink="true">https://teletype.in/@cybersecurity/Dnt4GFQDt</guid><link>https://teletype.in/@cybersecurity/Dnt4GFQDt?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=cybersecurity</link><comments>https://teletype.in/@cybersecurity/Dnt4GFQDt?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=cybersecurity#comments</comments><dc:creator>cybersecurity</dc:creator><title>Hacking with Python – 6 best online courses for ethical hackers</title><pubDate>Tue, 05 May 2020 13:00:19 GMT</pubDate><media:content medium="image" url="https://teletype.in/files/0b/6a/0b6ad051-2061-4fb8-8dea-6185ee2924db.png"></media:content><description><![CDATA[<img src="https://teletype.in/files/64/03/64037350-65d5-4726-a6b8-ce2efcfc10d1.jpeg"></img>If you’re looking to get into ethical hacking, getting acquainted with Python is a great start. We discuss Python and ethical hacking and reveal the best online courses you can take to start training in the field.]]></description><content:encoded><![CDATA[
  <p>If you’re looking to get into ethical hacking, getting acquainted with Python is a great start. We discuss Python and ethical hacking and reveal the best online courses you can take to start training in the field.</p>
  <p>If you want to Gain In-depth Knowledge on <strong>Python Hacking</strong>, please go through this link <strong><a href="https://onlineitguru.com/cyber-security-training.html" target="_blank">Cyber Security Online Training</a></strong></p>
  <p>Ethical hackers play an important role in organizations by finding and fixing vulnerabilities in systems and applications. Python is a <strong>high-level programming language</strong> that’s ideal for security professionals as it’s easy to learn and lets you create functional programs with a limited amount of code.</p>
  <figure class="m_retina">
    <img src="https://teletype.in/files/64/03/64037350-65d5-4726-a6b8-ce2efcfc10d1.jpeg" width="640" />
    <figcaption>Python For Hacking</figcaption>
  </figure>
  <p>A decent selection of courses are available to learn about ethical hacking with Python. However, not all are made the same. They vary greatly when it comes to program depth, suitability for various levels, accessibility, and price. We’ll go into more detail, but here’s a look at our online Python ethical hacking courses At <strong>ITguru</strong></p>
  <ol>
    <li> The Complete Python for Hacking and Cyber Security Bundle</li>
    <li> Intro to Python</li>
    <li> Developing Ethical Hacking Tools with Python</li>
    <li> Ethical Hacking with Python</li>
    <li> Python 3 For Offensive PenTest: A Complete Practical Course</li>
    <li>Python Network Programming | Network Apps &amp; Hacking Tools</li>
  </ol>
  <p>Our selections for the best courses for hacking with Python were based on the following criteria:</p>
  <ul>
    <li>Provides plenty of theoretical and practical teaching</li>
    <li>Offers values for money</li>
    <li>Is clear about who the course is suited to</li>
    <li>Can be completed entirely online</li>
    <li>Provides a certification of completion</li>
  </ul>
  <h2>Best online courses for ethical hacking with Python</h2>
  <p>Here’s our list of the best hacking with Python online courses for ethical hackers:</p>
  <h2>1. The Complete Python for Hacking and Cyber Security Bundle</h2>
  <p></p>
  <p><strong>ITguru</strong> offers a bundle of three courses designed to help complete Python beginners become advanced users with extensive cybersecurity knowledge. It include 36 hours of on-demand video lectures.</p>
  <p>Courses strike the <strong>perfect balance between the theoretical and practical components</strong> of hacking with Python. What’s more, they stick to the point, so you don’t get bogged down in unnecessary details that could be overwhelming, <strong><a href="https://onlineitguru.com/cyber-security-training.html" target="_blank">Cyber Security Training</a></strong> especially for beginners.</p>
  <p>You’ll learn by example, writing your own hacking and security programs, modeling problems, and designing and implementing the corresponding solutions.</p>
  <p>The courses included in the bundle are:</p>
  <ul>
    <li>Learn Python and Ethical Hacking From Scratch</li>
    <li>Python for Beginners: Learn Python Programming (Python 3)</li>
    <li>Cyber Security – Python and Web Applications</li>
  </ul>
  <p>If you’re looking to start a career in cybersecurity or simply want to learn more about hacking with Python, this bundle could be a great fit. What’s more, <strong>ITguru</strong> has a ton of other great courses and bundles available. You can even take advantage of its VIP Membership and get access to all courses for a low annual fee.</p>
  <h2>2. Intro to Python</h2>
  <p></p>
  <p>If you’re a high-level learner who just wants to learn the bare minimum, this one might be for you. Instructor Joe Perry keeps things simple in this course that’s <strong>geared toward non-coders</strong>. In it, you’ll learn the “must-know” aspects of Python rather than delving into its specifics.</p>
  <p>Intro to Python contains around 10 hours of material covering basic concepts up to advanced scripts. Designed to prepare people who are considering a career in penetration testing and cybersecurity, it focuses on teaching the commands and functions most critical to the industry.</p>
  <p>This course includes two modules:</p>
  <ul>
    <li>Just the Basics</li>
    <li>Data Types and Logic.</li>
  </ul>
  <p>Once you’re finished, if you’re looking to expand your knowledge, <strong>ITguru</strong> has plenty more courses to choose from, many of which are free. You’ll have to create an account to access any of the courses, and once you’re enrolled, you’ll be offered the Insider Pro package. This costs $99 per month (or $83 per month when billed annually) and gives you access to more courses, a career pathway guide, and a mentor. It comes with a seven-day free trial.</p>
  <p><strong>See also:</strong> Best ethical hacking courses</p>
  <h2>3. Developing Ethical Hacking Tools with Python</h2>
  <p></p>
  <p>Another popular offering on <strong>ITguru</strong> is <em>Developing Ethical Hacking Tools with Python</em>. This course includes just over an hour’s worth of videos so is quick to complete, but packed with useful information, including teaching you <strong>how to combine multiple Python libraries</strong> and automate information gathering. You’ll even learn how to code a keylogger and write a ZIP password bruteforcer.</p>
  <p>Here are the modules included in this course:</p>
  <ul>
    <li>Introduction</li>
    <li>Automating Information Gathering</li>
    <li>Writing a Keylogger in Python</li>
    <li>ZIP Password Bruteforcing in Python</li>
    <li>Going Forward</li>
  </ul>
  <p>This is considered an intermediate level course so some background knowledge in Python is needed. It might be a good idea to take the <em>Intro to Python</em> course followed by this one.</p>
  <h2>4. Ethical Hacking with Python</h2>
  <p></p>
  <p><em>Ethical Hacking with Python</em> is a comprehensive course containing just under eight hours of video tutorials. During this program, you’ll learn Python fundamentals including simple coding using variables, statements, and dictionaries.</p>
  <p>You’ll also have access to ethical hacking tutorials such as “Buffer overflow and exploit writing with Python” and “Syn Flood attack with Scapy.” The curriculum <strong>includes 23 lessons ranging from three to 36 minutes in length</strong>. Here are a few lesson examples:</p>
  <ul>
    <li>Python File Handling</li>
    <li>Ping Sweep with Scapy</li>
    <li>Object-Oriented Programming in Python</li>
    <li>Forensics Investigation with Python</li>
  </ul>
  <p>The course is suitable for complete beginners, but it does become fairly complex and could teach experienced programmers a thing or two. Each lesson includes an exam enabling you to identify gaps in your knowledge.</p>
  <p><strong>ITguru</strong> offers a free 5-day trial, so if you’re quick, you might be able to take this course for free. Once your trial is up, you’ll pay $9 for the first month and $59 per month after that. You can get discounts if you sign up for a six-month or annual term. If you’re only interested in this course, it’s also available on <strong>ITguru</strong>.</p>
  <h2>5. Python 3 For Offensive PenTest: A Complete Practical Course</h2>
  <p></p>
  <p><strong>ITguru</strong>&#x27;s popular Python 3 For Offensive PenTest course is for more advanced users. It covers <strong>in-depth topics related to ethical hacking and penetration testing</strong> but includes some real-world examples to help you see things from a practical perspective.</p>
  <p>The cost for this course is $99.99. The total length of all videos is around five hours; this includes 58 lectures split into seven modules:</p>
  <ul>
    <li>Quick Intro</li>
    <li>Python 3 / Windows 10 / Kali 2: Gaining Access – Your First Persistent Shell</li>
    <li>Python 3 / Windows 10 / Kali 2: Advanced Scriptable Shell</li>
    <li>Python 3 / Windows 10 / Kali 2: Catch Me If You Can!</li>
    <li>Python 3: How Malware Abuse Cryptography? Python Answers</li>
    <li>Python 3 / Windows 10 / Kali 2: Passwords Hacking</li>
    <li>Windows 7 &amp; 10 Privilege Escalation – Weak Service Permission</li>
  </ul>
  <p>One notable thing about this course is it’s regularly updated so you can be assured lessons deal with the most current information and program versions. What’s more, the course  is prompt in responses to student queries and will even make updates to the course upon request. ITguru courses come with a certificate of completion.</p>
  <blockquote>Take your career to new heights of success with an <strong><a href="https://onlineitguru.com/cyber-security-training.html" target="_blank">Cyber Security Online Course</a></strong></blockquote>
  <p>As mentioned, this isn’t considered a beginner’s program and prerequisites include beginner-level Python (or other scripting language) and intermediate-level knowledge of ethical hacking and penetration testing.</p>
  <h2>6. Python Network Programming | Network Apps &amp; Hacking Tools</h2>
  <p></p>
  <p>This is another, somewhat pricier, course offered by <strong>ITguru</strong>, but is targeted at beginners. The course is new to the platform but is already proving a hit having attracted thousands of students and racking up some great reviews. It <strong>takes things slow and explains everything you need to know</strong> about setting up your environment and getting started with Python 3.</p>
  <p>You’ll also learn about the basics of networking, including internet architecture and Python TCP connections. Practical lessons include setting up more than 15 Python 3 code application tools and networking applications, creating a man-in-the-middle Python 3 tool, and building a data scraping tool.</p>
  <p>The course consists of 26 lectures (about six hours of videos) split into four modules:</p>
  <ul>
    <li>Introduction To This Python 3 Course</li>
    <li>Setting Up Your Environment</li>
    <li>Getting Started With Python 3 Networking</li>
    <li>Python 3 Network Hacking</li>
  </ul>
  <p>It’s fairly pricey at $199.99 but ITguru does offer regular discounts so watch out for those.</p>
  <p><strong>ITguru</strong> offers many other cybersecurity-related courses, including more on the topic of hacking with Python. Here are a couple of others you may want to check out:</p>
  <ul>
    <li>Introduction To Python For Ethical Hacking</li>
    <li>Offensive Python | Mastering Ethical Hacking Using Python</li>
    <li>Cyber Security – Python and Web Applications</li>
  </ul>
  <h2>Why get into ethical hacking?</h2>
  <p>The term “hacking” often brings to mind criminals sitting behind a computer hiding their identity and wreaking digital havoc. However, not all hackers are malicious (black hat) hackers. Ethical (white hat) hackers <strong>play an extremely important role in cybersecurity</strong>. They find and fix security flaws before malicious parties have a chance to exploit them.</p>
  <p>With cybercrime becoming an increasingly prominent issue, it follows that the cybersecurity industry is growing. As such, there is high demand for ethical hackers with the know-how and savvy to beat criminals to the punch. Some of the responsibilities of ethical hackers entail:</p>
  <ul>
    <li>Scan an organization’s systems looking for ports open to attack</li>
    <li>Patch installations so they are up to date</li>
    <li>Test intrusion detection and prevention systems</li>
    <li>Scour every part of a company network looking for vulnerabilities</li>
    <li>Help deal with situations involving online employee fraud or theft of digital assets</li>
    <li>Check for things like hijacked web servers and applications and sniffing networks</li>
  </ul>
  <p>An ethical hacking career starts with a solid understanding of how to code followed by training in the specific areas you want to go into. You may wish to pursue a recognized accreditation in the field, for example, the Certified Ethical Hacker (CEH) certification.</p>
  <h2>Why use Python for ethical hacking?</h2>
  <p>Python is the programming language of choice for scores of ethical hackers. Indeed, a good handle of Python is considered essential for advancement in a cybersecurity career. One of the main draws is that you get a powerful language in a very easy-to-use package.</p>
  <p>Python is <strong>flexible and functional while being intuitive and easily readable</strong>. It’s ideal for scripting small programs, which is a huge part of the role of ethical hackers. Plus, when you start using Python, you join a huge community of dedicated fans. This means that should you need any tips or advice or run into some issues, there are plenty of resources — including documentation and forums — to turn to.</p>
  <p>Aside from cybersecurity, Python can be an invaluable language as part of a knowledge foundation in other careers too. Those interested in web development and testing, big data, game development, artificial intelligence, or smart device development can all benefit from knowledge of Python.</p>

]]></content:encoded></item><item><guid isPermaLink="true">https://teletype.in/@cybersecurity/U5wqrFLIn</guid><link>https://teletype.in/@cybersecurity/U5wqrFLIn?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=cybersecurity</link><comments>https://teletype.in/@cybersecurity/U5wqrFLIn?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=cybersecurity#comments</comments><dc:creator>cybersecurity</dc:creator><title>10 Cybersecurity Myths You Need to Stop Believing</title><pubDate>Tue, 28 Apr 2020 10:51:53 GMT</pubDate><description><![CDATA[Cybersecurity is one of the most integral aspects of business in today’s world. Companies have finally started to invest in cyber defense and training. However, despite all of the focus on making businesses cyber secure, there are various misconceptions and myths about Cyber Security  Training that should be avoided.]]></description><content:encoded><![CDATA[
  <p>Cybersecurity is one of the most integral aspects of business in today’s world. Companies have finally started to invest in cyber defense and training. However, despite all of the focus on making businesses cyber secure, there are various misconceptions and myths about <a href="https://onlineitguru.com/cyber-security-training.html" target="_blank"><strong>Cyber Security  Training</strong></a> that should be avoided.</p>
  <p><strong>Here are 10 cybersecurity myths you need to stop believing right now:</strong></p>
  <h3>1. Your business is too small for a cyber attack</h3>
  <p>This is one of the most prevalent cybersecurity myths that need to be debunked right this instant. Most Small and Mid-Sized Businesses (SMBs) think that they are safe from any kind of digital threats because they’re off the radar.</p>
  <p>That’s certainly not the case. Hackers don’t care about the scale of your organization to target it. Of course, there are some who’d prefer to hack the Bank of America, but most hackers would settle for smaller businesses. Especially when the SMBs think that they are safe and don’t invest in better a security system, they get hit. 58% of data breach targets are small businesses, says this report.</p>
  <p>Always be cautious. Doesn’t matter if you have 10 employees or 10,000, your business is at risk of getting hit by a cyber attack.</p>
  <h3>2. Anti-virus/Anti-malware is good enough</h3>
  <p>No anti-virus or anti-malware can keep your system safe from all types of cyber attacks. These software rely on a large database that has information about all the malware/viruses out there.</p>
  <p>However, if the hackers use a new kind of malware to infect your network or PC then there’s a high chance that these anti-virus software won’t be able to detect those. So, don’t solely rely on such software. They are only the first line of defense for your system and you should always have multiple defending options available.</p>
  <p>If you want to Gain In-depth Knowledge on <strong>Cyber Security</strong>, please go through this link <strong><a href="https://onlineitguru.com/cyber-security-training.html" target="_blank">Cyber Security Online Course</a></strong></p>
  <h3>3. Our passwords are strong</h3>
  <p>Most people think that their regular passwords are strong enough to stand against multiple break-in attempts. However, that’s a wrong mentality right there. No password can be 100% secure, no matter how many numbers and special characters you use in your passwords, there’s always a possibility that they can be cracked or leaked in some way.</p>
  <p>This is why it’s very important to keep changing your passwords on a regular basis. It could be weekly, bi-weekly, or monthly, but you need to regularly change your passwords, and have your employees change theirs.</p>
  <h3>4. Our industry doesn’t have any cyber threats</h3>
  <p>Wrong! Every industry is at risk. If you are connected to the internet in one way or another then you are at risk of getting digitally attacked. Movies and TV will have you believe that only tech or finance industries are prone to cyber attacks, but that’s not entirely true.</p>
  <p>Hackers target whatever they can, whenever they can. Even if you don’t have an e-commerce website, there’s still the risk of someone breaking into your organization’s network and wreaking havoc.</p>
  <h3>5. Bringing your own device is safe</h3>
  <p>Well, it’s definitely a cost-effective system to have your employees bring in and connect their personal devices to your organization’s network, but it also comes with a plethora of risks. Most employees have a bunch of personal devices ranging from a PC to their smartphone and when they connect to your network, it also becomes a whole new entry point for hackers.</p>
  <p>It only takes one weak link to bring cripple and bring down the entire network. So, make sure that all users adhere to your cybersecurity policies before they can use their personal devices.</p>
  <h3>6. Our cybersecurity system is PERFECT</h3>
  <p>No one is perfect!</p>
  <p>You can never be too sure about your cybersecurity ever. Technology is advancing with each passing hour. The unending evolution of technology also means that there are new threats emerging each day. So, your cybersecurity system that was top-notch back in the day, could be entirely obsolete in the future. For this reason, you need to constantly adapt newer cybersecurity policies and practices to avoid any mishaps.</p>
  <h3>7. Threats are only external</h3>
  <p>Most people will tell you that cybersecurity threats come from the outside. Some hackers sitting in a dark basement trying to hack into your organization’s network. But, they can not be any more wrong.</p>
  <p>Most of the cyber attacks, nearly 75% of data breaches are a result of someone on the inside, says research. A disgruntled employee, an ex-employee with a grudge, or just an ignorant user on your network can grant access to your entire organization’s data resulting in a massive data breach. It’s always a good idea to train your employees and teach them about cyber threats.</p>
  <h3>8. IT department will take care of it</h3>
  <p>Well, normally it’s the IT departments job to implement and review policies, but they can not take care of everything. The responsibility lies on each employees shoulder when it comes to cybersecurity. If the employees aren’t properly trained then they will end up downloading malware through emails or unsafe websites.</p>
  <p>There should be easy-to-understand training and clear policies regarding cyber safety. If your employees aren’t trained, they could unintentionally open up your organization to potential threats.</p>
  <h3>9. We don’t need tests or training</h3>
  <p>This could be the most dangerous and fatal myth out there. Some people think that watching a couple of YouTube videos or reading a few cybersecurity-related articles will bring them up to speed with all the risks and counter-measures. They often forego any testing or training which could prove to be fatal for the company.</p>
  <blockquote>Enroll for live free demo on <a href="https://onlineitguru.com/cyber-security-training.html" target="_blank"><strong>Cyber Security Online Training</strong></a></blockquote>
  <p>You need to regularly conduct pentests (Penetration tests) and assessments to find any vulnerabilities, and fix them in time.</p>
  <h3>10. We will see the virus right away</h3>
  <p>This would’ve been true almost a decade ago when viruses would slow down your computer, load pop-ups, and what not. However, today malware has become very stealthy. Most sophisticated viruses sit on your computer, avoiding any detection. These viruses can do massive damage which could be data leaks, sensitive information leaks, etc. Carry out regular checks to find any infections on your systems right away.</p>
  <h3>Finally</h3>
  <p>You need to stop believing these cybersecurity myths and up your cyber defenses. Otherwise, you are always at the risk of being attacked in the digital realm.</p>

]]></content:encoded></item><item><guid isPermaLink="true">https://teletype.in/@cybersecurity/LSkqfE5ru</guid><link>https://teletype.in/@cybersecurity/LSkqfE5ru?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=cybersecurity</link><comments>https://teletype.in/@cybersecurity/LSkqfE5ru?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=cybersecurity#comments</comments><dc:creator>cybersecurity</dc:creator><title>Security Best Practices: Symmetric Encryption with AES in Java and Android</title><pubDate>Mon, 13 Apr 2020 10:19:27 GMT</pubDate><media:content medium="image" url="https://teletype.in/files/f8/70/f870683f-2b03-4e61-8f52-8b32b7c69a56.png"></media:content><description><![CDATA[<img src="https://telegra.ph/file/1d1abc423a3ecce4a54a3.png"></img>In this article I will bring you up to speed on the Advanced Encryption Standard (AES), common block modes, why you need padding and initialization vectors and how to protect your data against modification. Finally I will show you how to easily implement this with Java avoiding most security issues.]]></description><content:encoded><![CDATA[
  <p>In this article I will bring you up to speed on the Advanced Encryption Standard (AES), common block modes, why you need padding and initialization vectors and how to protect your data against modification. Finally I will show you how to easily implement this with Java avoiding most security issues.</p>
  <figure class="m_original">
    <img src="https://telegra.ph/file/1d1abc423a3ecce4a54a3.png" width="1400" />
  </figure>
  <h3>What every Software Engineer should know about AES</h3>
  <p>AES, also known by its original name Rijndael, was selected by the NIST in 2000 to find a successor for the dated Data Encryption Standard(DES). AES is a block cipher, that means encryption happens on fixed-length groups of bits. In our case the algorithm defines 128 bit blocks. AES supports key lengths of 128, 192 and 256 bit.</p>
  <p>If you want to Gain In-depth Knowledge on <strong>Cyber Security</strong>, please go through this link <a href="https://onlineitguru.com/cyber-security-training.html" target="_blank"><strong>Cyber Security Training</strong></a></p>
  <p>Every block goes through many cycles of transformation rounds. I will omit the details of the algorithm here, but the interested reader is referred to the Wikipedia article about AES. The important part is that the key length does not affect the block size but the number of repetitions of transformation rounds (128-bit key is 10 cycles, 256 bit is 14)</p>
  <h3>Want to encrypt more than one Block?</h3>
  <p>So AES will only encrypt 128 bit of data, but if we want to encrypt whole messages we need to choose a block mode with which multiple blocks can be encrypted to a single cipher text. The simplest block mode is Electronic Codebook or ECB. It uses the same unaltered key on every block like this:</p>
  <figure class="m_original">
    <img src="https://telegra.ph/file/619b75c401a2b685047d8.png" width="601" />
  </figure>
  <p>This is particularly bad since identical plaintext blocks are encrypted to identical ciphertext blocks.</p>
  <figure class="m_original">
    <img src="https://telegra.ph/file/92f3fdf88035a8ebd6d2e.png" width="1400" />
  </figure>
  <p>Remember to never choose this mode unless you only encrypt data smaller than 128 bit. Unfortunately it is still often misused because it does not require you to provide an initial vector (more about that later) and therefore <em>seems </em>to be easier to handle for a developer.</p>
  <p>One case has to be handled with block modes though: what happens if the last block is not <em>exactly </em>128 bit? That’s where padding comes into play, that is, filling the missing bits of the block up. The simplest of which just fills the missing bits with zeros. There is practically no security implication in the choice of padding in AES.</p>
  <h3>Cipher Block Chaining (CBC)</h3>
  <p>So what alternatives to ECB are there? For one there is CBC which XORs the current plaintext block with the previous ciphertext block. This way, each ciphertext block depends on all plaintext blocks processed up to that point. Using the same image as before the result would be noise not distinguishable from random data:</p>
  <figure class="m_original">
    <img src="https://telegra.ph/file/8fe63aa7bb5fd738851aa.png" width="1400" />
  </figure>
  <p>So what about the first block? The easiest way is to just use a block full of e.g. zeros, but then every encryption with the same key and plaintext would result in the same ciphertext. Also if you reuse the same key for different plaintexts it would make it easier to recover the key. A better way is to use a random initialization vector (IV). This is just a fancy word for random data that is about the size of one block (128 bit). Think about it like the salt of the encryption, that is, an IV can be public, should be random and only used one time. Mind though, that not knowing the IV will only hinder the decryption of the first block since the CBC XORs the ciphertext not the plaintext of the previous one.</p>
  <p>When transmitting or persisting the data it is common to just prepend the IV to the actual cipher message. If you are interested on how to correctly use AES-CBC check out part 2 of this series.</p>
  <h3>Counter Mode (CTR)</h3>
  <p>Another option is to use CTR mode. This block mode is interesting because it turns a block cipher into a stream cipher which means no padding is required. In its basic form all blocks are numbered from 0 to n. Every block will now be encrypted with the key, the IV (also called <em>nonce </em>here) and the counter value.</p>
  <figure class="m_original">
    <img src="https://telegra.ph/file/94b30ad88f2ce0e47b4e8.png" width="902" />
  </figure>
  <p>The advantage is, unlike CBC, encryption can be done in parallel and all blocks are depended on the IV not only the first one. A big caveat is, that an IV must never be reused with the same key because an attacker can trivially calculate the used key from that.</p>
  <h3>Can I be sure that nobody altered my message?</h3>
  <p>The hard truth: <em>encryption does not automatically protect</em> against data modification. It is actually a pretty common attack. Read here on a more thorough discussion about this issue.</p>
  <p><br /></p>
  <p>So what can we do? We just add Message Authentication Code (MAC) to the encrypted message. A MAC is similar to a digital signature, with the difference that the verifying and authenticating key are practically the same. There are different variations of this method, the mode that is recommend by most researchers is called Encrypt-then-Mac. That is, after encryption a MAC is calculated on the cipher text and appended. You would usually use Hash-based message authentication code (HMAC) as type of MAC.</p>
  <p>So now it starts getting complicated. For integrity/authenticity we have to choose a MAC algorithm, choose an encryption tag mode, calculate the mac and append it. This is also slow since the whole message must be processed twice. The opposite side has to to the same but for decrypting and verifying.</p>
  <h3>Authenticated Encryption with GCM</h3>
  <p>Wouldn’t it be great if there were modes which handles all the authentication stuff for you? Fortunately there is a thing called authenticated encryption which simultaneously provides confidentiality, integrity, and authenticity assurances on the data. One of the most popular block modes that supports this is called Galois/Counter Mode or GCM for short (it is e.g. also available as a cipher suite in TLS v1.2)</p>
  <blockquote>Take your career to new heights of success with an <a href="https://onlineitguru.com/cyber-security-training.html" target="_blank"><strong>Cyber Security Online Training</strong></a></blockquote>
  <p>GCM is basically CTR mode which also calculates an authentication tag sequentially during encryption. This authentication tag is then usually appended to the cipher text. Its size is an important security property, so it should be at least 128 bit long.</p>
  <p>It is also possible to authenticate additional information not included in the plaintext. This data is called associated data. Why is this useful? For example the encrypted data has a meta property, the creation date, which is used to check if the content must be re-encrypted. An attacker could now trivially change the creation date, but if it is added as associated data, GCM will also verify this piece of information and recognize the change.</p>
  <h3>A heated discussion: What Key Size to use?</h3>
  <p>So intuition says: the bigger the better — it is obvious that it is harder to brute force a 256 bit random value than a 128 bit. With our current understanding brute forcing through all values of a 128 bit long word would require astronomically amount of energy, not realistic for anyone in sensible time (looking at you, NSA). So the decision is basically between infinite and infinite times 2¹²⁸.</p>
  <p>The argument follows: an AES encrypted message probably won’t be broken by brute forcing the key, but by other less expensive attacks (not currently known). These attacks will be as harmful to 128 bit key mode as to the 256 bit mode, so choosing a bigger key size doesn’t help in this case.</p>
  <p>So basically 128 bit key is enough security for most of every use case with the exception of quantum computer protection. Also using 128 bit encrypts faster than 256 bit and the key-schedule for 128 bit keys seems to be better protected against related-key attacks (however this is irrelevant to most real-world uses).</p>
  <h3>As a Side Note: Side Channel Attacks</h3>
  <p>Side channel attacks are attacks that aim to exploit issues specific to certain implementations. Encryption cipher schemes themself cannot be inherently protected against them. Simple AES implementations may be prone to timing and caching attacks among others.</p>
  <p>As a very basic example: a simple algorithm that is prone to timing attacks is an <code>equals()</code> method that compares two secret byte arrays. If the <code>equals()</code> has a quick-return, meaning after the first pair of bytes that don’t match it ends the loop, an attacker can measure the time it takes for the <code>equals()</code> to complete and can guess byte for byte until all match.</p>
  <figure class="m_original">
    <img src="https://telegra.ph/file/bd5cd8b54ed3201e94114.png" width="2000" />
  </figure>
  <p>One fix in this instance would be to use a constant-time equals. Mind that it is often not trivial to write constant time code in interpreted languages like JVM languages.</p>
  <p>Timing and caching attacks on AES are not merely theoretical and can even be exploited over a network. Although protecting against side channel attacks are mostly a concern of developers who implement cryptographic primitives, it is wise to get a sense of what coding practices may be detrimental to the security of the whole routine. The most general theme is, that the observable time-related behavior should not depend upon secret data. Additionally you should be carefully about what implementation to choose. For instance using Java 8+ with OpenJDK and the default JCA provider should internally use Intel’s AES-NI instruction set which is protected against most timing and caching attacks by being constant time and implemented in hardware (while still having good performance). Android uses it’s AndroidOpenSSLProvider which internally may use AES in hardware (ARM TrustZone) depending on the SoC, but Im not confident it has the same protection as Intels pedant. But even if you facilitate hardware, other attack vectors are available, for instance power analysis. Dedicated hardware exist that is specifically designed to protect against most of these issues, namely a hardware security module (HSM). Unfortunately these devices usually cost upwards of multiple thousand dollars(fun fact: your chip based credit card is also a HSM).</p>
  <h3>Implementing AES-GCM in Java and Android</h3>
  <p>So finally it gets practical. Modern Java has all the tools we need, but the crypto API might not be the most straight forward one. A mindful developer might also be unsure what length/sizes/defaults to use. <em>Note: if not stated otherwise everything applies equally to Java and Android.</em></p>
  <p><br /></p>
  <p>In our example we use a randomly generated 128 bit key. Java will automatically choose the correct mode when you pass a key with 192 and 256 bit length. Note however, 256 bit encryption usually requires the JCE Unlimited Strength Jurisdiction Policy installed in your JRE (Android is fine).</p>
  <pre>SecureRandom secureRandom = new SecureRandom();
byte[] key = new byte[16];
secureRandom.nextBytes(key);
SecretKey secretKey = SecretKeySpec(key, &quot;AES&quot;);
</pre>
  <p>Then we have to create our initialization vector. For GCM a 12 byte (not 16!) random (or counter) byte-array is recommend by NIST because it’s faster and more secure. Be mindful to always use a strong pseudorandom number generator (PRNG) like SecureRandom.</p>
  <pre>byte[] iv = new byte[12]; //NEVER REUSE THIS IV WITH SAME KEY
secureRandom.nextBytes(iv);
</pre>
  <p>Then initialize your cipher. AES-GCM mode should be available to most modern JREs and Android newer than v2.3 (although only fully functional on SDK 21+). If it happens to be not available install a custom crypto provider like BouncyCastle, but the default provider is usually preferred. We choose an authentication tag of size 128 bit</p>
  <pre>final Cipher cipher = Cipher.getInstance(&quot;AES/GCM/NoPadding&quot;);
GCMParameterSpec parameterSpec = new GCMParameterSpec(128, iv); //128 bit auth tag length
cipher.init(Cipher.ENCRYPT_MODE, secretKey, parameterSpec);
</pre>
  <p>Add optional associated data if you want (for instance meta data)</p>
  <pre>if (associatedData != null) {
    cipher.updateAAD(associatedData);
}
</pre>
  <p>Encrypt; if you are encrypting big chunks of data look into CipherInputStream so the whole thing doesn&#x27;t need to be loaded to the heap.</p>
  <pre>byte[] cipherText = cipher.doFinal(plainText);
</pre>
  <p>Now concat all of it to a single message</p>
  <pre>ByteBuffer byteBuffer = ByteBuffer.allocate(4 + iv.length + cipherText.length);
byteBuffer.putInt(iv.length);
byteBuffer.put(iv);
byteBuffer.put(cipherText);
byte[] cipherMessage = byteBuffer.array();
</pre>
  <p>Optionally encode it with e.g. Base64 if you require a string representation. Android does have a standard implementation of this encoding, the JDK only from version 8 on (I would avoid Apache Commons Codec if possible since it is slow and a messy implementation).</p>
  <p>And that’s basically it for encryption. For constructing the message, the length of the IV, the IV, the encrypted data and the authentication tag are appended to a single byte array. (in Java the authentication tag is automatically appended to the message, there is no way to handle it yourself with the standard crypto API).</p>
  <p>It is best practice to try to wipe sensible data like a cryptographic key or IV from memory as fast as possible. Since Java is a language with automatic memory management, we don’t have any guarantees that the following works as intended, but it should in most cases:</p>
  <pre>Arrays.fill(key,(byte) 0); //overwrite the content of key with zeros
</pre>
  <p>Be mindful to not overwrite data that is still used somewhere else.</p>
  <p>Now to the decrypt part; It works similar to the encryption; first deconstruct the message:</p>
  <pre>ByteBuffer byteBuffer = ByteBuffer.wrap(cipherMessage);
int ivLength = byteBuffer.getInt();
if(ivLength &lt; 12 || ivLength &gt;= 16) { // check input parameter
    throw new IllegalArgumentException(&quot;invalid iv length&quot;);
}
byte[] iv = new byte[ivLength];
byteBuffer.get(iv);
byte[] cipherText = new byte[byteBuffer.remaining()];
byteBuffer.get(cipherText);
</pre>
  <p>Be careful to validate input parameters, like the IV length, as an attacker may change the length value to e.g. 2³¹ which would allocate 2 GiB and probably fill your heap very quickly, making a denial of service attack trivial.</p>
  <p>Initialize the cipher and add the optional associated data and decrypt:</p>
  <pre>final Cipher cipher = Cipher.getInstance(&quot;AES/GCM/NoPadding&quot;);
cipher.init(Cipher.DECRYPT_MODE, new SecretKeySpec(key, &quot;AES&quot;), new GCMParameterSpec(128, iv));
if (associatedData != null) {
    cipher.updateAAD(associatedData);
}
byte[] plainText= cipher.doFinal(cipherText);
</pre>
  <p>That’s it! If you like to see a full example check out my Github project Armadillo where I use AES-GCM.</p>
  <h3>Summary</h3>
  <p>There are 3 properties we want for securing our data</p>
  <ul>
    <li>Confidentiality: The ability to prevent eavesdroppers from discovering the plaintext message, or information about the plaintext message.</li>
    <li>Integrity: The ability to prevent an active attacker from modifying the message without the legitimate users noticing.</li>
    <li>Authenticity — The ability to prove that a message was generated by a particular party, and prevent forgery of new messages. This is usually provided via a Message Authentication Code (MAC). Note that authenticity automatically implies integrity.</li>
  </ul>
  <p>AES with Galois/Counter Mode (GCM) block mode provides all those properties and is fairly easy to use and is available in most Java/Android environments. Just consider the following:</p>
  <ul>
    <li>Use a 12 byte initialization vector that is never reused with the same key (use a strong pseudorandom number generator like SecureRandom)</li>
    <li>Use a 128 bit authentication tag length</li>
    <li>Use a 128 bit key length (you will be fine!)</li>
  </ul>

]]></content:encoded></item><item><guid isPermaLink="true">https://teletype.in/@cybersecurity/DZyUzHBVU</guid><link>https://teletype.in/@cybersecurity/DZyUzHBVU?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=cybersecurity</link><comments>https://teletype.in/@cybersecurity/DZyUzHBVU?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=cybersecurity#comments</comments><dc:creator>cybersecurity</dc:creator><title>How to Secure Your Security at the Speed of 5G</title><pubDate>Fri, 10 Apr 2020 06:43:12 GMT</pubDate><media:content medium="image" url="https://teletype.in/files/f8/4b/f84b8ebf-d5cc-48d7-9020-4ed6f9ef14ec.png"></media:content><description><![CDATA[<img src="https://cdn5.alienvault.com/blog-content/Blog-Images/time_to_implement_graphic.png"></img>While some enterprises appear to be getting an early jump on the security implications of 5G, many are struggling with the implications to the business and the changing security model. This is based on a survey AT&amp;T Cybersecurity conducted with 451 Research of 704 cybersecurity professionals in North America, India, Australia and UK. Participating organizations spanned 13 industry verticals and each had more than 500 employees.]]></description><content:encoded><![CDATA[
  <p>While some enterprises appear to be getting an early jump on the security implications of 5G, many are struggling with the implications to the business and the changing security model. This is based on a survey AT&amp;T Cybersecurity conducted with 451 Research of 704 cybersecurity professionals in North America, India, Australia and UK. Participating organizations spanned 13 industry verticals and each had more than 500 employees.</p>
  <p>If you want to Gain In-depth Knowledge on <strong>Security</strong>, please go through this link <strong><a href="https://onlineitguru.com/cyber-security-training.html" target="_blank">Cyber Security Course</a></strong></p>
  <p>Here are excerpts from those surveyed in the AT&amp;T Cybersecurity Insights on their progress in making security changes required by 5G:</p>
  <h2>Timeframe to implement security changes</h2>
  <figure class="m_original">
    <img src="https://cdn5.alienvault.com/blog-content/Blog-Images/time_to_implement_graphic.png" width="798" />
    <figcaption>Time Frame</figcaption>
  </figure>
  <p>5G is more than an increase in speed – it’s not a “faster 4G&quot;. It provides new features such as network slicing, which allows for isolated domains for traffic. 5G service providers can assign slices to users with customizable quality of service and bandwidth.</p>
  <p>Sporting innovative built-in security measures, 5G can allow for stronger over-the-air encryption, subscriber identity protection and reduced risk of eavesdropping.</p>
  <p>At AT&amp;T, we believe that 5G will encourage a shared security model akin to the public cloud. The beauty of this is it shifts some security functions to the 5G service provider, freeing up enterprises from some concerns. The anticipated shared security model of 5G does require security pros to think differently, which will take time. However, in the end the shifting of some security functions to the 5G service provider may provide great benefits for enterprises.</p>
  <p>With the large number of devices associated with 5G, authentication and identity need to be considered in the scope of security, similar to the public cloud. The 5G service provider can help confirm device identity as well, because the network will know a device’s physical location. In a way, the 5G service provider uses the network itself as a security tool.</p>
  <p>Introducing 5G networking impacts many technical areas, but also provides an opportunity and motivation to modernize security approaches. Software Defined Network (SDN) and virtualization technologies should be considered by enterprises preparing for 5G due to its sheer scale. In parallel, security should be virtualized and automated.</p>
  <p>From the survey we learned the top security concerns cited were due to the increased attack surface. Have a look at what companies had to say:</p>
  <h2>Top 3 security concerns</h2>
  <figure class="m_original">
    <img src="https://teletype.in/files/e1/8b/e18babb5-054b-42f7-9ee5-5dd395ef7be2.png" width="1000" />
    <figcaption>Security Concerns</figcaption>
  </figure>
  <h2><strong>How Secure Will 5G Networks Be?</strong></h2>
  <p>Beyond all the vendor hype and hoopla, genuine security concerns abound. 5G technology is immature and there are questions about some of 5G’s technology underpinnings. For example, a group of researchers discovered security flaws in 5G networks (4G as well) which could be used by attackers to intercept phone calls and track the locations of smartphone users. The paper titled “Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information” details how these new vulnerabilities can defeat the security designed in to 5G to make it more difficult to spy on mobile users. In a different study, “A Formal Analysis of 5G Authentication,” researchers from ETH Zurich, the University of Lorraine and the University of Dundee caution that 5G is immature, insufficiently tested and it enables the “movement and access of vastly higher quantities of data, and thus broadens attack surfaces”.</p>
  <blockquote>Take your career to new heights of success with a <strong><a href="https://onlineitguru.com/cyber-security-training.html" target="_blank">Cyber Security Online Training</a></strong></blockquote>
  <p>Additionally, 5G has not, cannot be tested at scale. There is the likelihood that 5G will exacerbate some of the same security issues and attack vectors that we have today. The size and sophistication of distributed denial-of-service (DDoS) attacks have risen at an ever-accelerating pace,” according to a report by cybersecurity company A10 Networks. “As new 5G networks become operational, we expect the size of attacks will dwarf these records.”</p>
  <h2><strong>Will 5G Networks be Secure?</strong></h2>
  <p>Expressing concern over the security of 5G and future telecommunications systems, a group of senior U.S. senators introduced a recent bill that would require President Trump to maximize the security of domestic network infrastructure and that of foreign allies. The Secure 5G and Beyond Act was formally proposed by Senators John Cornyn, Richard Burr, and Mark Warner, with co-sponsors Susan Collins, Tom Cotton, Marco Rubio, and Michael Bennet. The bill seeks to:</p>
  <ul>
    <li>Require the President to create an inter-agency strategy to secure 5th generation and future generation technology and infrastructure in the United States and with our strategic allies.</li>
    <li>Designates NTIA as the Executive Agent to coordinate implementation of the strategy in coordination with the Chairman of the FCC, the Secretary of Homeland Security, the Director of National Intelligence, the Attorney General, and the Secretary of Defense.</li>
    <li>Ensure that the strategy does not include a recommendation to nationalize 5th generation deployment or future generations of mobile telecommunications infrastructure in the United States.</li>
  </ul>
  <p>Clearly 5G is inevitable but its path may not be as clear cut, or as rapid, as once envisioned. Should Huawei being banned from US and other European and Asian networks, carriers will be forced to seek other vendor options. That will take time and slow 5G rollout and adoption. And without 5G speeds, already stretched mobile networks make break under the strain and stress of billions of IoT devices. But without careful evaluation of the Huawei issue along with 5G’s immaturity and lack of scalable testing, we may all be living in a faster – yet more vulnerable – future.</p>
  <h2>Conclusion</h2>
  <p>5G has the potential to bring significantly more devices onto the network, expanding the attack surfaces and increasing the possibility of new threats. Security organizations relying on manual security approaches likely will have a hard time keeping up. Security that is dynamic and automated will be able to quickly and effectively address the new security threats of 5G networks, and virtualization can help provide flexibility to respond to unknown future threats.</p>

]]></content:encoded></item><item><guid isPermaLink="true">https://teletype.in/@cybersecurity/TW2PuMcOh</guid><link>https://teletype.in/@cybersecurity/TW2PuMcOh?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=cybersecurity</link><comments>https://teletype.in/@cybersecurity/TW2PuMcOh?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=cybersecurity#comments</comments><dc:creator>cybersecurity</dc:creator><title>Is Getting Your Certified Ethical Hacker (CEH) Worth It?</title><pubDate>Sat, 04 Apr 2020 11:42:27 GMT</pubDate><media:content medium="image" url="https://teletype.in/files/c4/fd/c4fd77c6-3344-4875-b15c-102eb07601a7.png"></media:content><description><![CDATA[<img src="https://teletype.in/files/f6/6b/f66b65de-025e-4099-a3ad-9b3db483df8d.jpeg"></img>We get this question all the time from IT professionals. They want to make sure that their money and time is going to be well spent. So, is becoming a white hat hacker worth it? The short answer is a resounding, “yes.”]]></description><content:encoded><![CDATA[
  <p>We get this question all the time from IT professionals. They want to make sure that their money and time is going to be well spent. So, is becoming a white hat hacker worth it? The short answer is a resounding, “yes.”</p>
  <p>If you’re interested in cyber security, the CEH certification is a great investment based on the knowledge you’ll gain alone. Beyond gaining technical know-how, CEH is also a valuable certification for your professional career.</p>
  <p>To get in-depth knowledge on <strong>Ethical Hacking</strong>, enroll for a live free demo on <strong><a href="https://onlineitguru.com/ethical-hacking-course.html" target="_blank">Ethical Hacking Online Training</a></strong></p>
  <p>Read on for three great reasons to stop waiting and get your CEH!</p>
  <figure class="m_original">
    <img src="https://teletype.in/files/f6/6b/f66b65de-025e-4099-a3ad-9b3db483df8d.jpeg" width="640" />
  </figure>
  <h2>INCREASE YOUR SALARY</h2>
  <p>The number one reason to get this certification is to command a higher salary. With an average CEH salary starting at around $73,000 and going as high as $132,000, you’re sure to see an improvement in your paycheck. Getting your CEH can help you secure a quick raise at work and qualify you for other higher-paying positions when you’re ready to change jobs.</p>
  <p>After comparing this against the cost of getting certified, it’s easy to see that your CEH is an investment that will quickly pay for itself and then some. If you can get your training covered by your employer, or paid for by a third party funding source, it’s a no-brainer.</p>
  <p>Of course, CEH doesn’t have to be where you stop on the path to career advancement. With this certification and some experience under your belt, you’ll be well on your way to earning your CISSP and other certifications that can easily take your earnings into triple digits.</p>
  <h2>FULFILL DOD COMPLIANCE REQUIREMENTS</h2>
  <p>If you’re interested in the Department of Defense (DoD) world, getting certified is a must. The DoD requires all of its Information Assurance officers be certified before handling sensitive information and network security. EC-Council’s Certified Ethical Hacker certification fulfills the DoD requirements for the CSSP Analyst, CSSP Infrastructure Support, CSSP Incident Responder, and CSSP Auditor roles.</p>
  <blockquote>To become a certified Ethical Hacker, Please go through the link <strong><a href="https://onlineitguru.com/ethical-hacking-course.html" target="_blank">Ethical Hacking Training</a></strong></blockquote>
  <p>The DoD is having trouble finding enough qualified candidates to fill these roles, which is why certifications like Security+ and CEH are so popular right now. With DoD contractors all over the United States (and abroad), getting CEH-certified offers a unique kind of job security no matter where life takes you. With demand at a record high and professionals with the required certs in such short supply, you can be sure that the salary for these DoD contractors will continue to climb.</p>
  <h2>ACHIEVE UNPARALLELED JOB SECURITY</h2>
  <p>The rate and severity of cyberattacks is climbing and causing billions of dollars of damage to companies and organizations the world over. According to the Ponemon Institute, “the average price for small businesses to clean up after their businesses have been hacked stands at $690,000; and, for middle market companies, it’s over $1 million.” Against expenses like this, it becomes quite cost-effective to hire cyber security professionals who can protect company assets before they’re attacked.</p>
  <p>According to the Bureau of Labor Statistics, Information Security Analysts have a fantastic 32% job growth outlook for 2018-2028, much faster than average for all industries. DoD contractors, cyber security defense firms, and large corporations are creating a huge and growing demand for qualified cyber professionals which virtually guarantees employment now and well into the future.</p>
  <h2>GET CEH TRAINING AT LEADERQUEST</h2>
  <p>If you’re ready to upgrade your paycheck and open new career opportunities, come get CEH certification training at LeaderQuest! Forget about self-paced learning and YouTube videos. Our cyber security school is led by industry experts with real-world experience, so you get the knowledge you need to excel. You’ll be ready to pass the CEH certification exam on the first try, but if you have any problems you can re-sit the course for free over the next 6 months.</p>
  <p>You can complete our CEH course in 5 weekdays with our daytime schedule or over 2 weeks on our evening schedule. With an included test voucher (CEH exam cost included) and onsite testing center, you can complete your certification and get back to work as efficiently as possible. So, are you ready to increase your job security and salary in a growing and lucrative industry?</p>

]]></content:encoded></item><item><guid isPermaLink="true">https://teletype.in/@cybersecurity/v06-yiWZy</guid><link>https://teletype.in/@cybersecurity/v06-yiWZy?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=cybersecurity</link><comments>https://teletype.in/@cybersecurity/v06-yiWZy?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=cybersecurity#comments</comments><dc:creator>cybersecurity</dc:creator><title>What is application security? A process and tools for securing software</title><pubDate>Wed, 01 Apr 2020 04:47:30 GMT</pubDate><description><![CDATA[<img src="https://teletype.in/files/ef/5e/ef5e22f0-470c-41d5-a7ef-4a1200845a4e.png"></img>Application security is the process of making apps more secure by finding, fixing, and enhancing the security of apps. Much of this happens during the development phase, but it includes tools and methods to protect apps once they are deployed. This is becoming more important as hackers increasingly target applications with their attacks.]]></description><content:encoded><![CDATA[
  <p>Application security is the process of making apps more secure by finding, fixing, and enhancing the security of apps. Much of this happens during the development phase, but it includes tools and methods to protect apps once they are deployed. This is becoming more important as hackers increasingly target applications with their attacks.</p>
  <p>If you want to Gain In-depth Knowledge on Security, please enroll for a live free demo on <strong><a href="https://onlineitguru.com/cyber-security-training.html" target="_blank">Cyber Security Training</a></strong></p>
  <p>Application security is getting a lot of attention. Hundreds of tools are available to secure various elements of your applications portfolio, from locking down coding changes to assessing inadvertent coding threats, evaluating encryption options and auditing permissions and access rights. There are specialized tools for mobile apps, for network-based apps, and for firewalls designed especially for web applications.</p>
  <figure class="m_original">
    <img src="https://teletype.in/files/ef/5e/ef5e22f0-470c-41d5-a7ef-4a1200845a4e.png" width="1000" />
  </figure>
  <h2>Why application security is important</h2>
  <p>According to Veracode’s State of Software Security Vol. 10 report, 83% of the 85,000 applications it tested had at least one security flaw. Many had much more, as their research found a total of 10 million flaws, and 20% of all apps had at least one high severity flaw. Not all of those flaws presents a significant security risk, but the sheer number is troubling.</p>
  <p>The faster and sooner in the software development process you can find and fix security issues, the safer your enterprise will be. Because everyone makes mistakes, the challenge is to find those mistakes in a timely fashion. For example, a common coding error could allow unverified inputs. This mistake can turn into SQL injection attacks and then data leaks if a hacker finds them. </p>
  <p>Application security tools that integrate into your application development environment can make this process and workflow simpler and more effective. These tools are also useful if you are doing compliance audits, since they can save time and the expense by catching problems before the auditors seen them. </p>
  <p>The rapid growth in the application security segment has been helped by the changing nature of how enterprise apps are being constructed in the last several years. Gone are the days where an IT shop would take months to refine requirements, build and test prototypes, and deliver a finished product to an end-user department. The idea almost seems quaint nowadays.</p>
  <p>Instead, we have new working methods, called continuous deployment and integration, that refine an app daily, in some cases hourly. This means that security tools have to work in this ever-changing world and find issues with code quickly.</p>
  <p>Many of these categories are still emerging and employ relatively new products. This shows how quickly the market is evolving as threats become more complex, more difficult to find, and more potent in their potential damage to your networks, your data, and your corporate reputation.</p>
  <h2>Application security tools</h2>
  <p>While there are numerous application security software product categories, the meat of the matter has to do with two: <strong>security testing tools</strong> and <strong>application shielding products</strong>. The former is a more mature market with dozens of well-known vendors, some of them are lions of the software industry such as IBM, CA and MicroFocus. These tools are well enough along that Gartner has created its Magic Quadrant and classified their importance and success. Review sites such as IT Central Station have been able to survey and rank these vendors, too.</p>
  <blockquote>To Become a Certified Ethical Hacker, Please go through the link <strong><a href="https://onlineitguru.com/ethical-hacking-course.html" target="_blank">Ethical Hacking Online Training</a></strong></blockquote>
  <p>Gartner categorizes the security testing tools into several broad buckets, and they are somewhat useful for how you decide what you need to protect your app portfolio:</p>
  <ul>
    <li><strong>Static testing</strong>, which analyzes code at fixed points during its development. This is useful for developers to check their code as they are writing it to ensure that security issues are being introduced during development.</li>
    <li><strong>Dynamic testing</strong>, which analyzes running code. This is more useful, as it can simulate attacks on production systems and reveal more complex attack patterns that use a combination of systems.</li>
    <li><strong>Interactive testing, </strong>which combines elements of both static and dynamic testing.</li>
    <li><strong>Mobile testing</strong> is designed specifically for the mobile environments and can examine how an attacker can leverage the mobile OS and the apps running on them in its entirety.</li>
  </ul>
  <p>Another way to look at the testing tools is how they are delivered, either via an on-premises tool or via a SaaS-based subscription service where you submit your code for online analysis. Some even do both.</p>
  <p>One caveat is the programming languages supported by each testing vendor. Some limit their tools to just one or two languages. (Java is usually a safe bet.) Others are more involved in the Microsoft .Net universe. The same goes for integrated development environments (IDEs): some tools operate as plug-ins or extensions to these IDEs, so testing your code is as simple as clicking on a button.</p>
  <p>Another issue is whether any tool is isolated from other testing results or can incorporate them into its own analysis. IBM’s is one of the few that can import findings from manual code reviews, penetration testing, vulnerability assessments and competitors’ tests. This can be helpful, particularly if you have multiple tools that you need to keep track of.</p>
  <p>Let’s not forget about app shielding tools. The main objective of these tools is to harden the application so that attacks are more difficult to carry out. This is less charted territory. Here you’ll find a vast collection of smaller, point products that in many cases have limited history and customer bases. The goal of these products is to do more than just test for vulnerabilities and actively prevent your apps from corruption or compromise. They encompass a few different broad categories:</p>
  <ul>
    <li><strong>Runtime application self-protection (RASP):</strong> These tools could be considered a combination of testing and shielding. They provide a measure of protection against possible reverse-engineering attacks. RASP tools are continuously monitoring the behavior of the app, which is useful particularly in mobile environments when apps can be rewritten, run on a rooted phone or have privilege abuse to turn them into doing nefarious things. RASP tools can send alerts, terminate errant processes, or terminate the app itself if found compromised.<br />RASP will likely become the default on many mobile development environments and built-in as part of other mobile app protection tools. Expect to see more alliances among software vendors that have solid RASP solutions. </li>
    <li><strong>Code obfuscation</strong>: Hackers often use obfuscation methods to hide their malware, and now tools allow developer to do this to help protect their code from being attacked.</li>
    <li><strong>Encryption and anti-tampering tools</strong>: These are other methods that can be used to keep the bad guys from gaining insights into your code.</li>
    <li><strong>Threat detection tools</strong>: These tools examine the environment or network where your apps are running and make an assessment about potential threats and misused trust relationships. Some tools can provide device “fingerprints” to determine whether a mobile phone has been rooted or otherwise compromised. Lets See How <strong><a href="https://onlineitguru.com/cyber-security-training.html" target="_blank">Cyber Security Online Training</a></strong> Will Help All</li>
  </ul>
  <h2>Application security challenges</h2>
  <p>Part of the problem is that IT has to satisfy several different masters to secure their apps. They first have to keep up with the evolving security and application development tools market, but that is just the entry point.</p>
  <p>IT also has to anticipate the business needs as more enterprises dive deeper into digital products and their application portfolio needs evolve to more complex infrastructure. They also have to understand how SaaS services are constructed and secured. This has been an issue, as a recent survey of 500 IT managers has found the average level of software design knowledge has been lacking. The report states, “CIOs may find themselves in the hot seat with senior leadership as they are held accountable for reducing complexity, staying on budget and how quickly they are modernizing to keep up with business demands.”</p>
  <p>Finally, the responsibility for application security could be spread across several different teams within your IT operations: The network folks could be responsible for running the web app firewalls and other network-centric tools, the desktop folks could be responsible for running endpoint-oriented tests, and various development groups could have other concerns. This makes it hard to suggest one tool that will fit everyone’s needs, which is why the market has become so fragmented.</p>
  <h2>Application security trends</h2>
  <p>In January 2019, Imperva published its State of Web Application Vulnerabilities in 2019. The overall findings were positive. While the number of web application vulnerabilities continues to grow, that growth is slowing. </p>
  <p>That&#x27;s due primarily to a decline in IoT vulnerabilities--only 38 new ones reported in 2019 versus 112 in 2018. API vulnerabilities, on the other hand, increased by 24% in 2019, but at less than half the 56% growth rate of 2018.</p>
  <p>Another area seeing more vulnerabilities emerge according to the Imperva report is in content management systems, Wordpress in particular. That platform saw a 30% increase in the number of reported vulnerabilities.</p>
  <p>The report noted that Drupal content management system, despite being far less popular than Wordpress, is becoming a target for attackers because of two vulnerabilities: Drupalgeddon2 (CVE-2019-7600) and Drupalgeddon3 (CVE-2018-7602). Both allow attacks to connect to back-end databases, scan and infect networks and clients with malware, or mine cryptocurrencies. Imperva claims to have blocked more than a half-million of attacks that use these vulnerabilities in 2019. </p>
  <p>The Veracode report shows that the most common types of flaws are:</p>
  <ul>
    <li>Information leakage (64%)</li>
    <li>Cryptographic issues (62%)</li>
    <li>CRLF injection (61%)</li>
    <li>Code quality (56%)</li>
    <li>Insufficient input validation (48%)</li>
    <li>Cross-site scripting (47%)</li>
    <li>Directory traversal (46%)</li>
    <li>Credentials management (45%)</li>
  </ul>
  <p>(Percentages represent prevalence in the applications tested.) The rate of occurrence for all the above flaws has increased since Veracode began tracking them 10 years ago. <strong><a href="https://onlineitguru.com/ethical-hacking-course.html" target="_blank">Ethical Hacking Training</a></strong></p>
  <p>One positive trend that the Veracode study found was that application scanning makes a big difference when it comes to fix rate and time to fix for application flaws. Overall fix rates, especially for high-severity flaws, are improving. The overall fix rate is 56%, up from 52% in 2018, and the highest severity flaws are fixed at a rate of 75.7%. A DevSecOps approach with frequent scanning and testing of software will drive down the time to fix flaws. Median time to repair for applications scanned 12 times or fewer per year was 68 days, while an average scan rate of daily or more lowered that rate to 19 days.</p>

]]></content:encoded></item><item><guid isPermaLink="true">https://teletype.in/@cybersecurity/G6nuLtjfJ</guid><link>https://teletype.in/@cybersecurity/G6nuLtjfJ?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=cybersecurity</link><comments>https://teletype.in/@cybersecurity/G6nuLtjfJ?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=cybersecurity#comments</comments><dc:creator>cybersecurity</dc:creator><title>Best Tools to Start Pen Testing</title><pubDate>Mon, 23 Mar 2020 12:03:57 GMT</pubDate><description><![CDATA[<img src="https://teletype.in/files/f0/f1/f0f1a78c-ac62-4e79-94bb-97a90add6009.png"></img>A big part of penetration testing is using the right tools. Being able to automate scans, crack passwords, and sniff packets can make you more effective at identifying vulnerabilities.]]></description><content:encoded><![CDATA[
  <p>A big part of penetration testing is using the right tools. Being able to automate scans, crack passwords, and sniff packets can make you more effective at identifying vulnerabilities.</p>
  <p>Like most jobs, getting familiar with pen testing requires getting familiar with the tools of the trade. To help you do that, we&#x27;ve compiled a list of 10 of the best tools for pen testers.</p>
  <p>If you want to Gain In-depth Knowledge on Pentesting, please go through this link <strong><a href="https://onlineitguru.com/ethical-hacking-course.html" target="_blank">Ethical Hacking Course</a></strong></p>
  <p>However, Before We Dive In, a Few Notes:</p>
  <p><strong>Hack responsibly!</strong> Pen testers and hackers have a lot of power in a digital world. That means they can do a lot of good, or a lot of bad. Aim to do good. As a popular Marvel superhero taught us: with great power comes great responsibility. Also be careful not to accidentally get yourself into legal trouble with unauthorized scans. We&#x27;d recommend reading Nmap&#x27;s &quot;Legal Issues&quot; article early on in your pen testing career.</p>
  <figure class="m_original">
    <img src="https://teletype.in/files/f0/f1/f0f1a78c-ac62-4e79-94bb-97a90add6009.png" width="332" />
  </figure>
  <p><strong>There&#x27;s more to pen testing than tools.</strong> Tools are definitely a big part of the job, but they are not all you need. Knowledge, experience, and outside-the-box thinking go a long way. Despite the powers of automation and software, the individual is still one of the most important aspects of pen testing. Be sure to invest the time and effort in understanding different aspects of InfoSec practically and conceptually along with learning about tools.</p>
  <p><strong>Aim for depth not just breadth.</strong> We have 10 tools, an operating system, and a bit on hacking hardware here. That alone is a lot to wrap your head around. Pen testers with a deep understanding of a few tools can do better than those with a shallow understanding of 100. Make sure you&#x27;re taking deep dives with the tools you choose. Doing so can make a huge difference. After all, a big part of effective hacking is catching someone else&#x27;s oversight or omission.</p>
  <p>With that out of the way, let&#x27;s jump into our list of penetration tools.</p>
  <h2>Nmap for Port Scanning</h2>
  <p>The open source Nmap (short for &quot;network mapper&quot;) is one of the most popular port scanners available. If you need a quick way to check open ports on a host or across a network, Nmap is a great tool. However, Nmap is much more than just a simple port scanner. It is a robust security auditing and network discovery tool. For example, Nmap&#x27;s Network Scripting Engine (NSE) enables in-depth network discovery and version detection, as well as a way to check for known vulnerabilities.</p>
  <p>Nmap itself is a command line utility. However, Zenmap provides users with a Graphical User Interface (GUI) for nmap. For pen testing we&#x27;d recommend getting comfortable with the command line, but a GUI can help early on.</p>
  <p>Given its power, extensibility, and ease of use, Nmap is an excellent addition to the aspiring pen tester&#x27;s tool kit. It&#x27;s available on a wide variety of *nix, Windows, and Mac OS X operating systems. You can download Nmap here.</p>
  <h2>WireShark for Packet Analysis</h2>
  <p>You may already know we&#x27;re big proponents of WireShark. As one of the most popular packet analyzers, WireShark a great tool for pen testers. In fact, Kali Linux has called WireShark the de facto standard for packet analysis in many industries.</p>
  <p>The reason WireShark is such a great tool is simple: packet analysis makes it possible for you to take deep dives. It is one of the best ways to learn how a system, protocol, or network work. Similarly, it&#x27;s also a great way to identify vulnerabilities during penetration tests.</p>
  <p>As with most tools on the list, WireShark has a robust CLI (command line interface). However, one of the things I like about WireShark is that for such a powerful tool, it has an intuitive GUI. In addition to capturing packets directly, I&#x27;ve found it helpful when parsing through .pacp files created by tcpdump.</p>
  <p>Like Nmap, WireShark is capable of running on a variety of operating systems including *nix, Windows, and OS X. You can download WireShark here <strong><a href="https://onlineitguru.com/ethical-hacking-course.html" target="_blank">Ethical Hacking Online Training</a></strong>.</p>
  <h2>Metasploit for Running Exploits</h2>
  <p>Metasploit is a pen testing framework collaboratively maintained by the open source community and Rapid7. Metasploit has gained popularity because it helps simplify advanced penetration testing. It integrates with tools like Nmap and scanners like Tenable&#x27;s Nessus.</p>
  <p>Metasploit&#x27;s platform makes it possible to automate vulnerability detection and have the tools to exploit them all in one place. The project also benefits from a very active support and development. The Metasploit team regularly releases updates with new modules and the Pro version receives patches with fixes and enhancements bi-weekly. To get an example of just how powerful Metasploit is, check out their EternalBlue module.</p>
  <p>Metasploit is supported on Windows, Linux, and Mac OS X. The free open source edition and commercially supported &quot;Pro&quot; edition can be downloaded here.</p>
  <h2>Aircrack-ng for Wifi Cracking</h2>
  <p>Wi-Fi cracking and password cracking are important aspects of penetration testing. Aircrack-ng is a suite of Wi-Fi security and cracking tools that has gained popularity in the InfoSec industry. Some of the things Aircrack-ng&#x27;s suite of tools enables pen testers to do are:</p>
  <ul>
    <li>Decrypt WEP/WPA/WPA2 Packet Captures</li>
    <li>Inject Frames Into Wireless Traffic</li>
    <li>Attack Wi-Fi Clients</li>
    <li>Graph Wi-Fi Networks</li>
    <li>Perform WEP, WPA, and WPA2-PSK Key Cracking</li>
    <li>Deauthenticate users based on MAC addresses or type of hardware</li>
  </ul>
  <p>Aircrack-ng is CLI-based, but various applications have incorporated it into GUIs. It is most commonly used on Linux, but also runs on Windows, Mac OS X, and OpenBSD. You can download source code and pre-complied binaries here.</p>
  <p>Fun fact: Aircrack-ng has appeared in multiple movies. It was even used correctly in the film Redes de Ambição.</p>
  <h2>BeEF for Client-Side Attacks</h2>
  <p>This BeEF (Browser Exploitation Framework) is a pen testing tool focused on web browsers. One of the biggest security concerns today is web-based attacks. Vulnerabilities in client browsers provide an attack surface for hackers to gain access to otherwise protected machines and networks.</p>
  <p>If you&#x27;re looking to assess and exploit browser vulnerabilities like cross-site scripting (XSS), BeEF may be just the tool you need. BeEF supports Mac OS X and Linux (no Windows support). You can download BeEF from their GitHub page.</p>
  <h2>Fiddler for Web Proxies</h2>
  <p>Fiddler is a multi-platform web proxy and debugger. It enables penetration testers to manipulate web sessions, decrypt HTTPS traffic, and record HTTP(S) traffic flows. In addition to testing for XXS, SQL injections, and buffer overflows, Fiddler (with the aid of the intruder21 add-on) can perform fuzz-testing against a website.</p>
  <p>Fiddler supports most major browsers as well as most major desktop and mobile operating systems. You can download Fiddler here.</p>
  <h2>John the Ripper for Password Cracking</h2>
  <p>Password cracking is a one of the textbook forms of hacking and an important aspect of pen testing. John the Ripper is one of the most popular password cracking tools available today. It started as a way to check for weak UNIX passwords, but has grown to become a more robust tool. Today, penetration testers can use John the Ripper to crack hundreds of password hashes and ciphers.</p>
  <p>While John the Ripper itself is a CLI tool, Johnny provides a cross-platform GUI for it.</p>
  <p>John the Ripper&#x27;s free and open source software is meant to be compiled from source code. It supports a variety of platforms including Windows, macOS, and Linux. The commercial John the Ripper Pro provides native installers if your looking for a streamlined install process. You can find links to source code and native installers on John the Ripper&#x27;s homepage. Lets See <strong><a href="https://onlineitguru.com/blogger/best-programming-languages-to-learn-for-ethical-hacking" target="_blank">Best Programming Languages For Ethgical Hacking</a></strong></p>
  <h2>Kismet for Packet Sniffing</h2>
  <p>Kismet is a wireless packet sniffer that is used for detection, wardiving, and wireless intrusion detection. In addition to Wi-Fi, Kismet works with Bluetooth interfaces and select software defined radio interfaces. Some of the most common uses for Kismet include Wi-Fi traffic sniffing and hidden wireless network discovery. As it is a passive sniffer, Kismet helps a tester remain hidden while sniffing.</p>
  <p>Kismet is supported by Linux and Mac OS X. It is also possible to use Kismet&#x27;s remote capture functionality Windows 10 with Windows Subsystem for Linux (WSL). You can download Kismet here.</p>
  <h2>ZAP for Web App Vulnerabilities</h2>
  <p>Zed Attack Proxy (ZAP) is a free and open source tool used to find vulnerabilities in web apps. It is also one of The Open Web Application Security Project&#x27;s (OWASP) flagship projects. ZAP is designed to be useful to beginners, but also powerful enough for professional pen testers. For beginners, that means you can hit the ground running with a professional grade tool.</p>
  <p>Functionality ZAP provides includes:</p>
  <ul>
    <li>Passive Vulnerability Scanning</li>
    <li>Active Vulnerability Scanning</li>
    <li>A spider to find web pages manual testing may miss</li>
    <li>Port Scanning</li>
    <li>Fuzzing (i.e. Performing Fuzz-Attacks)</li>
    <li>Reporting</li>
  </ul>
  <p>In addition to a GUI, ZAP offers an API for scripting and automation. ZAP works on Windows, Linux, and Mac. You can download ZAP from GitHub.</p>
  <h2>Burp Suite for Traffic Interception</h2>
  <p>Burp Suite is a popular suite of vulnerability scanning and security tools from PortSwigger. It is offered in 3 discrete tiers:</p>
  <ul>
    <li><strong>Community edition.</strong> This is the free version of Burp Suite that includes only &quot;essential&quot; manual tools.</li>
    <li><strong>Professional edition.</strong> The pro version includes essential and advanced manual tools as well as a vulnerability scanner.</li>
    <li><strong>Enterprise edition.</strong> The enterprise version of Burp Suite does not have any manual tools. It includes: vulnerability scanning, scheduling of scans, and integration with CI (continuous integration) platforms.</li>
  </ul>
  <p>Trusted by big names like SalesForce, Google, Amazon, and Twitter, it&#x27;s clear Burp Suite is a major player in the InfoSec world. It is designed to enable end-to-end testing. From the initial attack surface detection to exploiting vulnerabilities. Burp Suite is available for Windows, Linux, and Mac OS X.</p>
  <h2>Best Operating System for Pen Testing</h2>
  <p>Having a particular operating system isn&#x27;t required for pen testing. As we&#x27;ve seen, pen testing tools are available for most operating systems. However, there is a security-focused Linux distro that many professional penetration testers prefer. That operating system is Kali Linux. Kali comes bundled with many of the tools pen testers need and is designed with InfoSec in mind.</p>
  <p>In fact, just installing Kali as-is would give you access to a robust pen testing toolbox. As an added bonus.</p>
  <h2>Hardware for Hacking?</h2>
  <p>One thing that those new to pen testing may overlook is the need for the right hardware. Beyond the software tools we&#x27;ve mentioned here, there&#x27;s plenty of hardware used in penetration tests. Everything from special Wi-Fi adapters to lock picks to Raspberry Pis can be used to enable penetration testing.</p>
  <h2>Final Thoughts</h2>
  <p>The tools listed here are great options for getting started with penetration testing. They&#x27;re also suitable for the seasoned pro. Wherever you&#x27;re at in your pen testing journey, remember tools are just part of the job. A big part of being an effective pen tester is skill and creative thinking. With practice and experience, even a basic toolset can prove effective.</p>

]]></content:encoded></item></channel></rss>