One of the most exciting parts of the BCAware conference was getting to meet Brian Krebs live in person!
During his talk he shared some interesting topics such as how
cyber criminals are using websites similar to https://haveibeenpwned.com/
Except, that these “other” websites will actually list out
the users leaked password(s) in plaintext. And, with this method attackers can
now attack various social media, banking and other commonly used services
online to possibly find valid emails/passwords to accounts.
Another topic was related to how cyber criminals determine how much money to ask for during a
ransomware attack. The typical amount seems to point at about 10% of total
revenue a business makes from the previous year. This way, they do not ask for
too much or too little. It gets close to an amount that the organization can
afford, and finds would be cheaper than to recover from backups or rebuilding
the environment.
I’m proud to announce that I have now obtained my SANS – GIAC GCIH certification. It was a long process, and I pushed myself to get it done before the start of the New Year – 2020.
New SANS GIAC changes to exams
One thing that was particularly new
for me compared to the other 2 SANS exams I’ve done was the lab questions. SANS
with GIAC now has added a section that tests your knowledge through a virtual
lab. Now, I have to say I think it’s actually pretty awesome! It puts your real
world skills to the test to see if you can actually can apply needed practical
skills. It also gives companies assurance that their employees are also getting
and being tested on real hands on work and not just theory based topics.
Stealing Windows Wi-Fi WPA2-PSK Passwords through PowerShell
This week, I was hanging out with a friends, who happened to
forget their Wi-Fi Password to connect a new device to their network. I
decided, I would find a way and help them out so they could obtain the Wi-Fi
password. It then led me to a thought, that a malicious attacker could
technically use the same technique. Or, that it could be a good technique used
when pen testing an environment. So, therefore, I have decided to make a blog
post about it. Enjoy!
So, I ended up posting this much later than I anticipated. I originally had it ready for October. However, I had to make some final edits and had to delay it. None the less, here it is a month later!
Cyber security awareness month is coming up real soon. In
October, it is nationally known as cyber security month. Many security leaders
present important security topics. This is also a time where many companies,
government units and various organizations educate their members on cyber
security. Many hold training workshops, lectures and send out updates to their
workers.
I’d like to highlight some key points that readers should
try to implement and incorporate in their personal lives and at work.
The US Cert organization has built some excellent cyber
security training.
SEC545: Cloud Security Architecture and Operations
Just recently I went to attend a local SANS Community class in my city. For those that are not aware, SANS Community classes are usually smaller classes with 5-10+ students. It’s a small venue with more of a small class size, but the material would be the same that SANS would teach on vLive, OnDemand, or at a SANS conference.
I can say that the SEC545: Cloud Security Architecture and Operations class is VERY popular. There were many students there that were not hardcore SANS enthusiasts such as myself. Many people were there on the basis that companies are all now starting to move to the cloud. And, many companies are worried about the security implications of moving, and with larger concerns on if the architecture is not setup and configured correctly.
The class was very much AWS focused, which was great for me in terms of learning AWS. However, Read The Full Post
My name is Harry Taheem
I am a Cyber Security Engineer.
My aim is to post things I learn or find interesting and allow others to hopefully gain some more insight. I also plan on posting general IT related issues, as I’d like StealthBay to be a place where IT users can find some form of knowledge and education. And, hopefully I can learn a few new things from other users as well who also wish to share their own experiences and knowledge.