<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[ARTHDSEC]]></title><description><![CDATA[Where a cybersecurity researcher breaks down technical insights into digestible knowledge chunks.]]></description><link>https://arthdsec.com</link><image><url>https://substackcdn.com/image/fetch/$s_!w1ce!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F170b4d54-730e-42d7-91de-9180f56e01ca_256x256.png</url><title>ARTHDSEC</title><link>https://arthdsec.com</link></image><generator>Substack</generator><lastBuildDate>Thu, 16 Apr 2026 20:40:45 GMT</lastBuildDate><atom:link href="https://arthdsec.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Arwind Tharumadurai]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[arthdsec@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[arthdsec@substack.com]]></itunes:email><itunes:name><![CDATA[Arwind Tharumadurai]]></itunes:name></itunes:owner><itunes:author><![CDATA[Arwind Tharumadurai]]></itunes:author><googleplay:owner><![CDATA[arthdsec@substack.com]]></googleplay:owner><googleplay:email><![CDATA[arthdsec@substack.com]]></googleplay:email><googleplay:author><![CDATA[Arwind Tharumadurai]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[CVE-2020-21469 is not a security vulnerability]]></title><description><![CDATA[On August 29th, 2023, the PostgreSQL Security Team ruled that CVE-2020-21469 is not a valid security vulnerability.]]></description><link>https://arthdsec.com/p/cve-2020-21469-is-not-a-security</link><guid isPermaLink="false">https://arthdsec.com/p/cve-2020-21469-is-not-a-security</guid><dc:creator><![CDATA[Arwind Tharumadurai]]></dc:creator><pubDate>Wed, 31 Dec 2025 05:29:22 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1504275107627-0c2ba7a43dba?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw3N3x8cmFuZG9tfGVufDB8fHx8MTc2NzA4NjA3Nnww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1504275107627-0c2ba7a43dba?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw3N3x8cmFuZG9tfGVufDB8fHx8MTc2NzA4NjA3Nnww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1504275107627-0c2ba7a43dba?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw3N3x8cmFuZG9tfGVufDB8fHx8MTc2NzA4NjA3Nnww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1504275107627-0c2ba7a43dba?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw3N3x8cmFuZG9tfGVufDB8fHx8MTc2NzA4NjA3Nnww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1504275107627-0c2ba7a43dba?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw3N3x8cmFuZG9tfGVufDB8fHx8MTc2NzA4NjA3Nnww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1504275107627-0c2ba7a43dba?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw3N3x8cmFuZG9tfGVufDB8fHx8MTc2NzA4NjA3Nnww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1504275107627-0c2ba7a43dba?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw3N3x8cmFuZG9tfGVufDB8fHx8MTc2NzA4NjA3Nnww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="4446" height="3334" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1504275107627-0c2ba7a43dba?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw3N3x8cmFuZG9tfGVufDB8fHx8MTc2NzA4NjA3Nnww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:3334,&quot;width&quot;:4446,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;assorted-color lockers&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="assorted-color lockers" title="assorted-color lockers" srcset="https://images.unsplash.com/photo-1504275107627-0c2ba7a43dba?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw3N3x8cmFuZG9tfGVufDB8fHx8MTc2NzA4NjA3Nnww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1504275107627-0c2ba7a43dba?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw3N3x8cmFuZG9tfGVufDB8fHx8MTc2NzA4NjA3Nnww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1504275107627-0c2ba7a43dba?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw3N3x8cmFuZG9tfGVufDB8fHx8MTc2NzA4NjA3Nnww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1504275107627-0c2ba7a43dba?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw3N3x8cmFuZG9tfGVufDB8fHx8MTc2NzA4NjA3Nnww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@moren">moren hsu</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p>On August 29th, 2023, the PostgreSQL Security Team ruled that <strong>CVE-2020-21469</strong> is not a valid security vulnerability.</p><p>The CVE, originally discovered in PostgreSQL 12.2, purportedly allowed attackers to cause a Denial of Service (DoS) by repeatedly sending SIGHUP signals to the primary PostgreSQL process. In Linux environments, SIGHUP (Signal Hang Up) is typically used by daemons - such as web or database servers - to trigger a configuration file reload without stopping the process.</p><p>The security team disputed the vulnerability classification because the attack vector requires an account with explicitly granted elevated privileges. To execute this attack, a user must be:</p><ul><li><p>A PostgreSQL superuser</p></li><li><p>A user explicitly granted permission to execute <code>pg_reload_conf</code> by a superuser</p></li><li><p>An operating system user with privileged access to the server process</p></li></ul><p>As noted by Eugene Lim in From Day Zero to Zero Day, if an attacker already possesses these privileges, they can compromise or halt the database using standard functionality without needing to exploit this specific &#8220;vulnerability&#8221;.</p><p>The PostgreSQL Security Team&#8217;s stance relies on the principle that <strong>superuser access implies total contro</strong>l. If a user can send process signals (like SIGHUP) or execute <code>pg_reload_conf</code>, they have administrative control. A DoS by an administrator is considered a configuration or personnel issue, not a software vulnerability.</p>]]></content:encoded></item><item><title><![CDATA[Dear Intern, here is my advice!]]></title><description><![CDATA[The world of cybersecurity is ever evolving and landing an internship is an incredible opportunity.]]></description><link>https://arthdsec.com/p/dear-intern-here-is-my-advice</link><guid isPermaLink="false">https://arthdsec.com/p/dear-intern-here-is-my-advice</guid><dc:creator><![CDATA[Arwind Tharumadurai]]></dc:creator><pubDate>Mon, 29 May 2023 01:49:22 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/b6a561b5-3085-45cb-bc90-3d62faa9597b_2000x2000.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9l2u!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69e45791-eb08-4305-9605-25bc14212d73_2000x2000.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9l2u!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69e45791-eb08-4305-9605-25bc14212d73_2000x2000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!9l2u!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69e45791-eb08-4305-9605-25bc14212d73_2000x2000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!9l2u!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69e45791-eb08-4305-9605-25bc14212d73_2000x2000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!9l2u!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69e45791-eb08-4305-9605-25bc14212d73_2000x2000.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9l2u!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69e45791-eb08-4305-9605-25bc14212d73_2000x2000.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/69e45791-eb08-4305-9605-25bc14212d73_2000x2000.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!9l2u!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69e45791-eb08-4305-9605-25bc14212d73_2000x2000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!9l2u!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69e45791-eb08-4305-9605-25bc14212d73_2000x2000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!9l2u!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69e45791-eb08-4305-9605-25bc14212d73_2000x2000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!9l2u!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69e45791-eb08-4305-9605-25bc14212d73_2000x2000.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/de/@chmarco?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">Marco Chilese</a> / <a href="https://unsplash.com/?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">Unsplash</a></figcaption></figure></div><p>The world of cybersecurity is ever evolving and landing an internship is an incredible opportunity. You may gain real-world experience on how things are getting done or how threat actors launch attacks towards an organisation. Putting aside those practical experience, you even may expand your knowledge, and set a solid foundation for &nbsp;your future career. As a cybersecurity administrator, I have traversed the cybersecurity landscape, and I would like to share some valuable advice with you, the current crop of cybersecurity interns. So buckle up, put on your virtual armor, and let's dive into the world of cybersecurity internships!</p><h2>Communication is the key</h2><h3>"As they always say"</h3><p>One of the most crucial aspects of being a successful cybersecurity intern is effective communication. Cybersecurity is a team sport, and keeping an open line of communication with your colleagues is essential. Whether you have a question, need clarification, or want to share your insights, don't hesitate to reach out. Regularly engage in team meetings, discussions, and brainstorming sessions to collaborate effectively. By fostering a culture of communication, you not only contribute to the team's success but also enhance your own learning experience.</p><h2>Do not be dependent. Show that you are more than their expectations</h2><h3>Captain Yami: Push your limits! Right Now, Right Here</h3><p>Internships are the perfect opportunity to showcase your skills and prove that you are capable of going above and beyond expectations. Don't limit yourself to the tasks assigned to you; instead, take initiative and explore areas that interest you. Show your supervisors and colleagues that you are eager to learn and contribute in ways they may not have anticipated. Take on additional responsibilities, offer assistance where needed, and demonstrate your ability to take charge when required. Remember, the cybersecurity landscape is constantly evolving, and being adaptable and proactive will set you apart from the rest.</p><div><hr></div><p>Subscribe to my weekly newsletter! &#129782;</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://arthdsec.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://arthdsec.com/subscribe?"><span>Subscribe</span></a></p><div><hr></div><h2>Always be humble</h2><h3>"GaryVee's favorite ingredient"</h3><p>Humility is a quality that goes a long way in the field of cybersecurity. While your internship is undoubtedly a stepping stone toward your future career, it's important to approach it with humility. Recognize that you still have much to learn and embrace every opportunity as a chance to grow. Be open to feedback, listen attentively, and learn from the experiences of your mentors and team members. Remember, the world of cybersecurity is vast and complex, and maintaining a humble attitude will not only earn you respect but also help you acquire knowledge and skills that can't be taught in a classroom.</p><h2>Even if you're just an intern, do not be afraid of giving out ideas</h2><h3>Even flat-earthers giving out their idea &#127758;</h3><p>Internships are not just about completing assigned tasks; they are also a platform for you to share your unique perspectives and ideas. Don't underestimate the value of your insights, even as an intern. Cybersecurity is an ever-changing field that thrives on innovation and out-of-the-box thinking. Your fresh perspective may uncover vulnerabilities, suggest novel approaches, or contribute to process improvements. So, don't be afraid to speak up and share your ideas. Your voice matters, and your unique perspective could make a significant impact on the team.</p><p>As you embark on your cybersecurity internship journey, remember that you are part of a dynamic and rapidly growing field. Embrace the challenges, stay curious, and seize every opportunity to learn. Cybersecurity is not just a job; it's a mindset, a commitment to protecting critical information and infrastructure in an increasingly digital world. By following these pieces of advice, you will not only make the most of your internship experience but also set yourself up for a promising career in the realm of cybersecurity.</p>]]></content:encoded></item><item><title><![CDATA[File Sharing is just a name. Discover the protocols underneath.]]></title><description><![CDATA[File sharing has become a fundamental part of our lives, allowing us to transfer data quickly and efficiently.]]></description><link>https://arthdsec.com/p/file-sharing-is-just-a-name-discover-the-protocols-underneath</link><guid isPermaLink="false">https://arthdsec.com/p/file-sharing-is-just-a-name-discover-the-protocols-underneath</guid><dc:creator><![CDATA[Arwind Tharumadurai]]></dc:creator><pubDate>Wed, 03 May 2023 02:46:42 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/8cf34bbb-7681-440c-84ba-d1416870088d_2240x1260.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!POFY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc05233c1-de82-403d-abb7-a4ff2604991e_2240x1260.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!POFY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc05233c1-de82-403d-abb7-a4ff2604991e_2240x1260.png 424w, https://substackcdn.com/image/fetch/$s_!POFY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc05233c1-de82-403d-abb7-a4ff2604991e_2240x1260.png 848w, https://substackcdn.com/image/fetch/$s_!POFY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc05233c1-de82-403d-abb7-a4ff2604991e_2240x1260.png 1272w, https://substackcdn.com/image/fetch/$s_!POFY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc05233c1-de82-403d-abb7-a4ff2604991e_2240x1260.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!POFY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc05233c1-de82-403d-abb7-a4ff2604991e_2240x1260.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c05233c1-de82-403d-abb7-a4ff2604991e_2240x1260.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!POFY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc05233c1-de82-403d-abb7-a4ff2604991e_2240x1260.png 424w, https://substackcdn.com/image/fetch/$s_!POFY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc05233c1-de82-403d-abb7-a4ff2604991e_2240x1260.png 848w, https://substackcdn.com/image/fetch/$s_!POFY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc05233c1-de82-403d-abb7-a4ff2604991e_2240x1260.png 1272w, https://substackcdn.com/image/fetch/$s_!POFY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc05233c1-de82-403d-abb7-a4ff2604991e_2240x1260.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>File sharing has become a fundamental part of our lives, allowing us to transfer data quickly and efficiently. With the rise of the Internet and the advent of digital technology, sharing files has become easier than ever before. To enable file sharing, various protocols have been developed over time that govern how data is transmitted and received between computers.</p><p>One of the most widely used file sharing protocols is<strong> FTP</strong>, which has been in use since the 1970s. It is simple to use, and its client-server model makes it easy for users to share files between computers over the Internet. FTP supports various transfer modes, allowing users to transfer different types of files with ease. However, one of the downsides of FTP is that it is not secure, meaning that data can be intercepted and accessed by unauthorized users.</p><p>To address this issue, <strong>Secure File Transfer Protocol (SFTP)</strong> was developed. SFTP provides added security to the file transfer process by encrypting the data during transmission, making it more challenging for hackers to intercept and access the files being transferred. SFTP is commonly used for transferring sensitive data such as financial records, medical records, and personal data. SFTP's security features make it a preferred protocol for organizations and individuals who need to ensure that their data is protected during transmission.</p><p><strong>Server Message Block (SMB) </strong>is another popular file sharing protocol used for sharing files, printers, and other resources between computers on a network. It is most commonly used on Windows-based systems and allows users to access files stored on a remote server as if they were stored locally. SMB is also used by some network-attached storage devices, making it an essential protocol for organizations that need to share files across multiple devices.</p><p><strong>Web Distributed Authoring and Versioning (WebDAV)</strong> is a protocol used for sharing files over the Internet. It allows users to edit and manage files stored on remote servers, making it an ideal choice for teams collaborating on a project. WebDAV is commonly used in web applications, content management systems, and other online collaboration tools.</p><p><strong>Peer-to-peer (P2P) </strong>file sharing protocols such as BitTorrent and eDonkey Network are used for sharing large files over the Internet. P2P file sharing does not rely on a central server; instead, users connect directly to one another to exchange data. This approach allows for faster file transfers and better bandwidth utilization, but it also raises concerns about piracy and copyright infringement.</p><p>In conclusion, file sharing protocols play a vital role in enabling the transfer of data between computers over networks and the Internet. Each protocol has its own set of features and benefits, allowing users to choose the one that best suits their needs. While file sharing protocols have made file sharing easier than ever, it is important to ensure that file sharing practices are legal and comply with all relevant laws and regulations.</p>]]></content:encoded></item><item><title><![CDATA[Pain and Suffering: Climbing the Pyramid of Pain]]></title><description><![CDATA[Pain and suffering is the last thing you wish happen to you.]]></description><link>https://arthdsec.com/p/pain-and-suffering</link><guid isPermaLink="false">https://arthdsec.com/p/pain-and-suffering</guid><dc:creator><![CDATA[Arwind Tharumadurai]]></dc:creator><pubDate>Thu, 23 Mar 2023 06:41:00 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/a17dc6de-d204-4d7c-8e5c-2c5effcf185e_2240x1260.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6R39!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F375a3b42-9b75-434f-9e03-ac57333e62bd_2240x1260.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6R39!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F375a3b42-9b75-434f-9e03-ac57333e62bd_2240x1260.png 424w, https://substackcdn.com/image/fetch/$s_!6R39!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F375a3b42-9b75-434f-9e03-ac57333e62bd_2240x1260.png 848w, https://substackcdn.com/image/fetch/$s_!6R39!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F375a3b42-9b75-434f-9e03-ac57333e62bd_2240x1260.png 1272w, https://substackcdn.com/image/fetch/$s_!6R39!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F375a3b42-9b75-434f-9e03-ac57333e62bd_2240x1260.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6R39!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F375a3b42-9b75-434f-9e03-ac57333e62bd_2240x1260.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/375a3b42-9b75-434f-9e03-ac57333e62bd_2240x1260.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6R39!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F375a3b42-9b75-434f-9e03-ac57333e62bd_2240x1260.png 424w, https://substackcdn.com/image/fetch/$s_!6R39!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F375a3b42-9b75-434f-9e03-ac57333e62bd_2240x1260.png 848w, https://substackcdn.com/image/fetch/$s_!6R39!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F375a3b42-9b75-434f-9e03-ac57333e62bd_2240x1260.png 1272w, https://substackcdn.com/image/fetch/$s_!6R39!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F375a3b42-9b75-434f-9e03-ac57333e62bd_2240x1260.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption">The pyramid image is from TryHackMe</figcaption></figure></div><p>Pain and suffering is the last thing you wish happen to you. This goes to information security as well. As a security professional who are in the domain of threat intelligence often face cyberthreat on daily basis. Given these challenges, security professionals have to stay ahead in detecting, preventing, and mitigating threats to defend their organizations.</p><p>In this blog post, we will uncover "Pyramid of Pain", a cyber defense frameworks that will help security professionals to help with threat detection and mitigation.</p><blockquote><p>&#128161; Learning Advice: Whenever you want to learn any frameworks, it is important to know what is the framework, for whom the framework is designed, what is the need for the framework to exist, and how the framework contribute in the industry.</p></blockquote><h2>What is "Pyramid of Pain"?</h2><h3>Defining the concept of the framework.</h3><p>Pyramid of Pain is an information security framework that emphasize in defending the security posture of IT infrastrure within an organization. The framework is designed by DavidJBianco in 2013. The term pyramid is choosen due to the framework is illustrated in the shape of pyramid. It symbolizes IOCs from the less painful to most painful - from bottom to the top level. An Indicator of Compromise (IoC) is a piece of evidence or artifact that suggests a security breach or cyber attack may have occurred.</p><p>Image below illustrates "Pyramid of Pain".</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ttrp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22613a59-1ad3-47fc-9fce-3f4ff84e108f_720x405.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ttrp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22613a59-1ad3-47fc-9fce-3f4ff84e108f_720x405.png 424w, https://substackcdn.com/image/fetch/$s_!ttrp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22613a59-1ad3-47fc-9fce-3f4ff84e108f_720x405.png 848w, https://substackcdn.com/image/fetch/$s_!ttrp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22613a59-1ad3-47fc-9fce-3f4ff84e108f_720x405.png 1272w, https://substackcdn.com/image/fetch/$s_!ttrp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22613a59-1ad3-47fc-9fce-3f4ff84e108f_720x405.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ttrp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22613a59-1ad3-47fc-9fce-3f4ff84e108f_720x405.png" width="720" height="405" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/22613a59-1ad3-47fc-9fce-3f4ff84e108f_720x405.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:405,&quot;width&quot;:720,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!ttrp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22613a59-1ad3-47fc-9fce-3f4ff84e108f_720x405.png 424w, https://substackcdn.com/image/fetch/$s_!ttrp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22613a59-1ad3-47fc-9fce-3f4ff84e108f_720x405.png 848w, https://substackcdn.com/image/fetch/$s_!ttrp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22613a59-1ad3-47fc-9fce-3f4ff84e108f_720x405.png 1272w, https://substackcdn.com/image/fetch/$s_!ttrp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22613a59-1ad3-47fc-9fce-3f4ff84e108f_720x405.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image Credit: DavidJBianco, 2013</figcaption></figure></div><p>As seen in the image above, there are six levels of Indicator of Compromise (IOC). The six levels of IOCs in the Pyramid of Pain are arranged in a way how "painful" it would be for the attacker if the victim detected them and took action against them. Those six levels of IOCs are listed and explained below:</p><ol><li><p>Hash Values (Trivial): A hash value is a piece of cryptographic output that derives by inputting a file. The output is uniquely assigned to a file which we call it as a file signature. No two files should have the same cryptographic hashes.</p></li><li><p>IP Addresses (Easy): Internet Protocol (IP) Addresses are the symbolisation of a device connected to the Internet. There are no scenarios where a device can be connected to the Internet without an IP address assigned to it.</p></li><li><p>Domain Names (Simple): Domain name is a string of text that used to identify a resource available on Internet such as website and server.</p></li><li><p>Network/Host Artifacts (Annoying): A network artifact is a product of network activity, while a host artifact is a product of host activity on a host endpoint.</p></li><li><p>Tools (Challenging): Tools are used by attackers to carry out scanning or exploitation such as scripts and backdoors.</p></li><li><p>TTPs (Tough): Tactics, Techniques, and Procedures (TTPs) is a modus operandi that identify attackers. It consists from the initial method of entry, all the way to laterally moving across the victim's network and exfiltrating data.</p></li></ol><h2>Who is this framework for?</h2><h3>Highlighting who should use this framework to better the security posture.</h3><div class="paywall-jump" data-component-name="PaywallToDOM"></div><p>"Pyramid of Pain" is undeniably a valuable conceptual model that can be referred by security professionals. Though this framework often utilised by security analyst and security architect, the framework itself is not restrictive to any particular domain within information security. It is possible for both red and blue team people to make use of this framework.</p><h3>Red Team</h3><p>Red teams can use the Pyramid of Pain as a guide for developing and executing their penetration testing or adversary simulation campaigns. By focusing on the higher levels of the pyramid, red teams can test an organization's ability to detect and respond to advanced threats and attacks.</p><p>For example, if a red team is able to successfully use a low-level IOC, such as a hash value or an IP address, to gain access to an organization's network, it may not be a good indicator of the organization's security posture. However, if the red team is able to use a higher-level IOC, such as a specific domain name or a unique file name, it is a stronger indicator that the organization has weaknesses in their security defenses.</p><p>Moreover, the red team can use the Pyramid of Pain to identify the most effective tactics, techniques, and procedures (TTPs) to use during their engagement. By using the higher-level IOCs, the red team can identify which TTPs are most effective in evading detection and response.</p><h3>Blue Team</h3><p>Blue teams can focus their efforts on identifying and monitoring the higher-level IOCs, which are more difficult to detect and respond to. For example, if a blue team identifies a specific domain name or file name associated with a threat actor, they can use that information to hunt for other related indicators, such as IP addresses or command-and-control (C2) servers, which may be less obvious and more difficult to detect.</p><p>By understanding the difficulty level of various IOCs, blue teams can also better assess the effectiveness of their defensive measures. For example, if a blue team has deployed a security solution that is able to detect low-level IOCs such as IP addresses, but is ineffective against higher-level IOCs such as specific domain names or file names, they can use that information to improve their defenses and prioritize the deployment of more effective security controls.</p><h2>Why this framework need to exist?</h2><h3>Explaining the existence of this framework even there were many framework serve the same purpose.</h3><p>Indeed there are many other frameworks in existence, each framework may have its own unique perspective or methodology for identifying and prioritizing IOCs based on various factors such as the difficulty of detection, the level of sophistication of the attacker, or the potential impact of the attack.</p><p>One reason why the Pyramid of Pain has gained popularity is its simplicity and intuitive nature. It provides a clear visual hierarchy of IOC difficulty that can be easily understood and communicated to stakeholders across an organization. This framework has also been embraced by the cybersecurity community, and many security vendors and organizations have adopted it as a way to prioritize and categorize IOCs in their products and services.</p><h2>How this framework contributes to the industry?</h2><h3>Each framework should contribute a purpose to the industry.</h3><p>The Pyramid of Pain framework can contribute significantly to the information security industry by providing a standardized approach to the classification and prioritization of indicators of compromise (IOCs). By understanding the difficulty level of different IOCs, organizations can prioritize their defense efforts and allocate their resources more effectively to protect against advanced threats.</p><p>Additionally, the Pyramid of Pain can guide incident response efforts by helping security teams to determine the level of sophistication of the attacker and the potential impact of the attack.</p>]]></content:encoded></item><item><title><![CDATA[Your way into NMAP; From Internals to Basic Usage.]]></title><description><![CDATA[As a security analyst, you know the importance of having a comprehensive understanding of the network infrastructure you are trying to protect.]]></description><link>https://arthdsec.com/p/windows-recon-nmap-host-discovery</link><guid isPermaLink="false">https://arthdsec.com/p/windows-recon-nmap-host-discovery</guid><dc:creator><![CDATA[Arwind Tharumadurai]]></dc:creator><pubDate>Sat, 04 Mar 2023 11:57:46 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/a94b415b-dcef-4c17-88ee-e5bf8c66cfc6_2000x1333.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!oZul!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3292093c-18f9-4b11-84f9-e461f00f1ee4_2000x1333.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!oZul!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3292093c-18f9-4b11-84f9-e461f00f1ee4_2000x1333.jpeg 424w, https://substackcdn.com/image/fetch/$s_!oZul!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3292093c-18f9-4b11-84f9-e461f00f1ee4_2000x1333.jpeg 848w, https://substackcdn.com/image/fetch/$s_!oZul!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3292093c-18f9-4b11-84f9-e461f00f1ee4_2000x1333.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!oZul!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3292093c-18f9-4b11-84f9-e461f00f1ee4_2000x1333.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!oZul!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3292093c-18f9-4b11-84f9-e461f00f1ee4_2000x1333.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3292093c-18f9-4b11-84f9-e461f00f1ee4_2000x1333.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!oZul!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3292093c-18f9-4b11-84f9-e461f00f1ee4_2000x1333.jpeg 424w, https://substackcdn.com/image/fetch/$s_!oZul!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3292093c-18f9-4b11-84f9-e461f00f1ee4_2000x1333.jpeg 848w, https://substackcdn.com/image/fetch/$s_!oZul!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3292093c-18f9-4b11-84f9-e461f00f1ee4_2000x1333.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!oZul!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3292093c-18f9-4b11-84f9-e461f00f1ee4_2000x1333.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@brandsandpeople?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">Brands&amp;People</a> / <a href="https://unsplash.com/?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">Unsplash</a></figcaption></figure></div><p>As a security analyst, you know the importance of having a comprehensive understanding of the network infrastructure you are trying to protect. This includes knowing which ports are open, which services are running, and what vulnerabilities may exist. One tool that can help you gain this understanding is Nmap.</p><p>Nmap is a free and open-source network exploration and security auditing tool. It uses various techniques, such as port scanning and OS detection, to gather information about network hosts and services. In this blog post, we'll explore Nmap from its internals to advanced usage.</p><p>My personal note: Please learn basic computer networking concepts to understand what is happening behind each Nmap command.</p><div><hr></div><p><strong>Understanding Nmap's Internal Operations</strong></p><p>At its core, Nmap is a command-line tool that sends packets to a target machine and listens for their responses. The packets sent and received by Nmap can be customized using various options and arguments, allowing for a wide range of scanning techniques.</p><p>Nmap uses different scan types, including SYN, TCP connect, UDP, and others. Each scan type has its advantages and disadvantages, and the selection depends on the type of network you are scanning and the desired outcome. For example, a SYN scan is faster than a TCP connect scan but may miss open ports that only respond to a full TCP handshake.</p><p>Nmap also includes advanced techniques, such as OS detection, version detection, and script scanning. These techniques allow Nmap to determine the operating system and the software versions running on target machines, as well as identify potential vulnerabilities.</p><div><hr></div><p><strong>Basic Usage of Nmap</strong></p><p>Using Nmap is relatively easy. To get started, you need to install Nmap on your machine, which is available for Windows, Linux, and macOS. Once installed, you can run Nmap from the command line.</p><p>The most basic scan using Nmap is a ping scan. This scan simply sends an ICMP echo request to the target host and waits for a response. To perform a ping scan, run the following command:</p><p><code>nmap -sn &lt;target IP&gt;</code></p><p>This command sends an ICMP echo request to the target IP and waits for a response. If the target responds, Nmap returns the IP address and the status of the host.</p><div><hr></div><p><strong>Advanced Usage of Nmap</strong></p><p>Nmap offers many advanced features that can provide more comprehensive information about the target network. One of the most useful features is script scanning, which allows you to run custom scripts against the target host.</p><p>For example, you can run a script that checks for the presence of a specific vulnerability or identifies the software running on the target machine. To use script scanning, use the following command:</p><p><code>nmap -sC &lt;target IP&gt;</code></p><p>This command instructs Nmap to run all the default scripts against the target host. You can also run specific scripts using the <code>-script</code> option.</p><p>Another advanced feature of Nmap is OS detection. Nmap uses a variety of techniques, including TCP/IP fingerprinting and packet analysis, to identify the operating system running on the target machine. To use OS detection, run the following command:</p><p><code>nmap -O &lt;target IP&gt;</code></p><p>This command instructs Nmap to perform an OS detection scan against the target IP.</p><div><hr></div><p><strong>Conclusion</strong></p><p>Nmap is a powerful tool for network exploration and security auditing. By understanding the internals of Nmap and its various scanning techniques, you can gain a comprehensive understanding of the target network and identify potential vulnerabilities. Whether you're a beginner or an experienced security analyst, Nmap is a must-have tool in your arsenal.</p>]]></content:encoded></item><item><title><![CDATA[Finding the meaning "Why We Need CIA Triad?"]]></title><description><![CDATA[Cybersecurity has emerged within the CIA Triad.]]></description><link>https://arthdsec.com/p/finding-the-meaning-why-we-need-cia-triad</link><guid isPermaLink="false">https://arthdsec.com/p/finding-the-meaning-why-we-need-cia-triad</guid><dc:creator><![CDATA[Arwind Tharumadurai]]></dc:creator><pubDate>Sat, 25 Feb 2023 18:19:01 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/d4642615-99df-465e-ad1a-e3e005fa985b_2000x2000.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JN32!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62fa63ed-7f54-4579-aa8a-953703982da8_2000x2000.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JN32!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62fa63ed-7f54-4579-aa8a-953703982da8_2000x2000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!JN32!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62fa63ed-7f54-4579-aa8a-953703982da8_2000x2000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!JN32!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62fa63ed-7f54-4579-aa8a-953703982da8_2000x2000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!JN32!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62fa63ed-7f54-4579-aa8a-953703982da8_2000x2000.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JN32!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62fa63ed-7f54-4579-aa8a-953703982da8_2000x2000.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/62fa63ed-7f54-4579-aa8a-953703982da8_2000x2000.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!JN32!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62fa63ed-7f54-4579-aa8a-953703982da8_2000x2000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!JN32!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62fa63ed-7f54-4579-aa8a-953703982da8_2000x2000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!JN32!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62fa63ed-7f54-4579-aa8a-953703982da8_2000x2000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!JN32!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62fa63ed-7f54-4579-aa8a-953703982da8_2000x2000.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@cdd20?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">&#24858;&#26408;&#28151;&#26666; cdd20</a> / <a href="https://unsplash.com/?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">Unsplash</a></figcaption></figure></div><blockquote><p>Cybersecurity has emerged within the CIA Triad.</p></blockquote><p>In case this is your first time coming across with the term "cybersecurity", then I suggest you to read my first article. Click here!</p><p>As the world becomes increasingly interconnected and reliant on digital technology, protecting sensitive information has become a critical concern for individuals and organizations alike.</p><p>Cybersecurity has emerged as a crucial field, and the CIA triad is one of the fundamental concepts that underpins it. In this blog, we will explore what the CIA triad is, why it is essential, and how it can help us better understand the importance of information security.</p><h2>Let's Define CIA</h2><p>CIA stands for Confidentiality, Integrity, and Availability. It is a framework that organizations use to evaluate and protect their data, systems, and networks from threats.</p><p><strong>Confidentiality</strong> refers to ensuring that sensitive information is only accessible to authorized individuals or systems. This includes protecting against unauthorized access, disclosure, and theft. Confidentiality is essential for protecting sensitive information such as trade secrets, personal data, and financial information.</p><p><strong>Integrity </strong>is concerned with ensuring that information is accurate, complete, and trustworthy. This involves protecting against unauthorized modification, deletion, or corruption of data. Integrity is essential for maintaining the trustworthiness and reliability of information, such as financial records, legal documents, and medical records.</p><p><strong>Availability </strong>refers to ensuring that information is accessible and usable when needed. This includes protecting against denial-of-service attacks, system failures, and other events that could disrupt access to information. Availability is essential for ensuring that critical systems and services remain operational, such as online banking, healthcare systems, and emergency services.</p><h2>The Importance of CIA Triad</h2><p>Well you may ask me why is it so important to know the CIA Triad. The reason behind it is the CIA covers the structure of most all the frameworks, technologies, and policies in information security. With that being said, focusing on the key aspects of confidentiality, integrity, and availability, organizations can create a comprehensive security strategy that covers all aspects of their operations.</p><p>The CIA triad also provides a useful framework for evaluating and prioritizing security measures. By understanding the potential threats to their data, systems, and networks, organizations can develop an effective security strategy that addresses the most significant risks. This could involve implementing access controls, encryption, backup and recovery procedures, and other security measures that align with the principles of the CIA triad.</p><p>Moreover, the CIA triad is also a useful concept for individuals to understand. In today's digital age, we all have a responsibility to protect our own data and privacy. By understanding the importance of confidentiality, integrity, and availability, we can take steps to protect our personal information, such as using strong passwords, keeping software up-to-date, and being cautious about sharing personal information online.</p><h2>Conclusion</h2><p>The CIA triad is a fundamental concept in information security that provides a comprehensive framework for protecting data, systems, and networks. By understanding the principles of confidentiality, integrity, and availability, organizations and individuals can develop effective security strategies that address the most significant risks. In today's digital age, cybersecurity is more critical than ever, and the CIA triad is an essential tool for protecting sensitive information from a wide range of threats.</p>]]></content:encoded></item></channel></rss>