<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Uday Mittal's Substack]]></title><description><![CDATA[Cybersecurity professional. Specializing in Offensive Security and Cyber Defense. I write about technology and cybersecurity.]]></description><link>https://www.udaymittal.com</link><image><url>https://substackcdn.com/image/fetch/$s_!4-oo!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eca86ff-0051-4405-b74f-74d582ba8c15_561x561.png</url><title>Uday Mittal&apos;s Substack</title><link>https://www.udaymittal.com</link></image><generator>Substack</generator><lastBuildDate>Sun, 03 May 2026 10:05:21 GMT</lastBuildDate><atom:link href="https://www.udaymittal.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Uday Mittal]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[udaymittal@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[udaymittal@substack.com]]></itunes:email><itunes:name><![CDATA[Uday Mittal]]></itunes:name></itunes:owner><itunes:author><![CDATA[Uday Mittal]]></itunes:author><googleplay:owner><![CDATA[udaymittal@substack.com]]></googleplay:owner><googleplay:email><![CDATA[udaymittal@substack.com]]></googleplay:email><googleplay:author><![CDATA[Uday Mittal]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[The Data Breach That Changed Everything]]></title><description><![CDATA[The 2013 Target data breach redefined cybersecurity forever, making it a board-level concern, leading to CISO hirings, and accelerating chip-and-PIN adoption.]]></description><link>https://www.udaymittal.com/p/the-data-breach-that-changed-everything</link><guid isPermaLink="false">https://www.udaymittal.com/p/the-data-breach-that-changed-everything</guid><dc:creator><![CDATA[Uday Mittal]]></dc:creator><pubDate>Sat, 17 Jan 2026 05:04:31 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/334563f8-98f9-403d-b8e8-964d118fae9a_760x397.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The <a href="https://www.commerce.senate.gov/services/files/24d3c229-4f2f-405d-b8db-a3a67f183883">2013 Target data breach</a> stands as one of the most impactful cybersecurity incidents in the history, not just because of its scale, but due to the <a href="https://krebsonsecurity.com/wp-content/uploads/2014/01/Inside-a-Targeted-Point-of-Sale-Data-Breach.pdf">profound changes</a> it brought to how businesses handle cybersecurity. The breach exposed the personal information, including credit and debit card data, of over <a href="https://laist.com/shows/take-two/target-says-up-to-40-million-people-affected-by-account-data-breach">40 million customers</a>, causing a ripple effect that shook the retail giant and reverberated across industries. In the weeks following the breach, Target faced enormous public backlash, legal challenges, and <a href="https://www.thesslstore.com/blog/2013-target-data-breach-settled/">a staggering financial loss</a>&#8212;both in terms of fines and the erosion of customer trust. However, the ramifications of this breach went far beyond Target, shifting the very foundations of how cybersecurity was viewed by companies worldwide.</p><p>One of the most immediate and significant fall-outs of the breach was its impact on the leadership. In 2014, <a href="https://www.forbes.com/sites/clareoconnor/2014/05/05/target-ceo-gregg-steinhafel-resigns-in-wake-of-data-breach-fallout/">Target&#8217;s CEO Gregg Steinhafel became the first CEO of a major corporation to lose his job as a direct result of a data breach</a>. This unprecedented move sent shock-waves through the corporate world, signalling that cybersecurity was no longer just an IT issue&#8212;it had become a top-level executive concern. Steinhafel&#8217;s resignation marked a pivotal moment, underscoring that CEOs and senior leadership could be held accountable for security failures, a shift that has only strengthened in the years since. The breach brought a sobering realization: cybersecurity wasn&#8217;t just a technical matter but a business risk that could have existential consequences.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.udaymittal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Uday Mittal's Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>The breach also <a href="https://www.techtarget.com/searchsecurity/tip/FAQ-Were-executives-held-accountable-after-the-Target-data-breach">made cybersecurity a board-level issue</a> for companies globally. Until that point, boardrooms typically didn&#8217;t allocate significant time to discussing cybersecurity risks, often leaving these concerns to the IT department. However, <a href="https://www.techtarget.com/searchsecurity/tip/FAQ-Were-executives-held-accountable-after-the-Target-data-breach">Target&#8217;s experience</a> changed that. The breach highlighted the fact that cybersecurity risks could not only cause financial loss but also irreparably damage a company&#8217;s reputation. Boards of directors began to realize that their fiduciary duties extended to cybersecurity oversight. As a result, we saw a dramatic shift in corporate governance, with boards regularly including cybersecurity risks in their risk management strategies. This breach, in many ways, sparked the ongoing conversation about the board&#8217;s responsibility for overseeing cybersecurity in organizations.</p><p>Before the breach, Target did not have a Chief Information Security Officer (CISO). <a href="https://www.wsj.com/articles/BL-CIOB-5463">This absence proved to be a costly oversight</a>. Without a dedicated executive focused on cybersecurity, there was insufficient attention on the organisation&#8217;s security controls and risk management practices. The breach prompted not just Target but many other organizations to take the role of a CISO more seriously. The event triggered a surge in CISO hiring across industries, with companies recognizing that the absence of this role left them vulnerable to emerging cyber threats. The role of the CISO has since evolved into a critical executive position, <a href="https://yaksas.com/p/keep-this-in-mind-while-searching">responsible not just for security</a> but for ensuring that cybersecurity is aligned with the business&#8217;s overall objectives and risk appetite.</p><p>Another major fallout (rather a sliver-lining) was the acceleration of the <a href="https://www.trendmicro.com/vinfo/in/security/news/security-technology/emv-chip-and-pin-cards-and-target-breach">shift to chip-and-PIN technology for credit and debit cards</a>. In 2013, while chip-and-PIN technology existed, it was not widely adopted in the United States. The Target breach exposed just how vulnerable magnetic stripe cards were to fraud, particularly in large-scale breaches like this one. In the aftermath, credit card companies expedited the rollout of chip-and-PIN cards, which offer more robust protection.</p><p>In many ways, the Target data breach can be seen as a turning point for the cybersecurity industry. It highlighted weaknesses that companies could no longer afford to ignore, and it spurred organisations to take concrete steps toward strengthening their defences.</p><p>The lessons from the Target data breach remain highly relevant. The breach taught companies the importance of proactive cybersecurity measures, the dangers of neglecting security at the executive level, and the need for robust protections in payment systems. More importantly, it demonstrated that the consequences of a data breach extend far beyond IT departments&#8212;they can reshape entire industries.</p><p>How do you think the role of a CISO has evolved since the Target data breach? </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.udaymittal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Uday Mittal's Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Stay away from cheap Microsoft Office 365 accounts]]></title><description><![CDATA[Why you should not purchase Microsoft Office 365 accounts from shady websites and what can happen if you do?]]></description><link>https://www.udaymittal.com/p/stay-away-from-cheap-microsoft-office</link><guid isPermaLink="false">https://www.udaymittal.com/p/stay-away-from-cheap-microsoft-office</guid><dc:creator><![CDATA[Uday Mittal]]></dc:creator><pubDate>Sun, 30 Mar 2025 08:59:45 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/915945c3-d863-45e3-8bb8-5a2a17843b42_2048x2048.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Time for a confession&#8230;</p><p>About two years back, I bought a cheap Microsoft Office 365 account. The deal was really attractive almost 90% discount, 5 devices, lifetime access, latest updates and 5 TB OneDrive storage. I know what you might be thinking, this sounds too good to be true. Uday! how can you fall for it? I accept my mistake. Turns out, I am not the only one who fell for the lure as we&#8217;ll see (not trying to justify my decision) .</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.udaymittal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Uday Mittal's Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h4>What happened after I bought the account?</h4><p>Soon after I made the payment, I received an email with the credentials of a brand new Microsoft Office 365 account. The account was not tied to any of my email addresses instead the seller, created the account with new email address tied to a custom domain that they owned. </p><p>I logged in to the account to verify if everything was as promised. Surprise, surprise&#8230;(well, not really) I found out that the OneDrive storage that I received was just 100 GB instead of the promised 5 TB. I reached out to the given support email address highlighting the issue and asked them for a refund. I know what&#8217;s going on in your mind, <em>exepcting refund from a dubious website, what were you thinking, Uday!</em>  I agree. Forget the refund, I did not even receive a response from them. </p><p>So I changed the password of the account and let it be. </p><p>I also knew from a &#8220;<em>past experience</em>&#8221; that the lifetime access claim is only valid until Microsoft does not find out about this. Once they do find out, they block all accounts associated with the domain name, leaving them effectively useless. </p><h4>What happened two years after I bought the account?</h4><p>I almost forgot about this account, until a few days back. I was going through my inbox and found the mail with it&#8217;s credentials. I thought let&#8217;s login and see whats the status of this account. Obviously, I couldn&#8217;t login with those credentials because I had changed the password but I was only able to recall that after two hours of failed efforts to regain access to this account. </p><p>Now, you might ask, why I wasn&#8217;t able to recover this account even after spending two hours? Good question. </p><p>Turns out, the permission to reset password of such accounts lies only with the administrator of the Microsoft 365 tenant and Microsoft doesn&#8217;t give out the administrator email ID <em>that easily</em>. So as a user I did not have any recourse other than to really strain my memory and recall the password.</p><p>Finally, I logged in to the account with the password that I had set. As soon as I logged on, I received a notification that this account has been blocked and I could not access most of the services associated with it. No surprise there.</p><p>Being a curious cat, I searched to see if the domain name associated with the account was available to purchase (maybe I&#8217;d get lucky). Much to my surpise, it was available to purchase and that too at normal rate. Interesting! right? I purchased it right away. </p><h4>What happened after I purchased the domain name?</h4><p>Two things happened:</p><ul><li><p>I got the administrator email ID.</p></li><li><p>I found out how many people fell for this lure (remember, I mentioned that I wasn&#8217;t the only one).</p></li></ul><h4>How I got the administrator email ID?</h4><p>If you have a Microsoft 365 tenant of your own, you can add a custom domain name to it. If that domain name exists within another Microsoft 365 tenant, Microsoft won&#8217;t let you add it to your tenant until it is removed from the previous tenant. To help you with that, Microsoft provides the administrator email ID associated with that other tenant. The idea being that you can directly reach out to the other tenant administrator and sort it out without Microsoft&#8217;s intervention. </p><h4>How I found out how many people fell for this lure?</h4><p>After I bought the domain name, I set a catch-all to catch emails sent to any email address associated with that domain name. Catch-all allows domain name owners to receive emails sent to any email address associated with their domain name, whether they exists or not. </p><p>Within a week, the catch-all caught over 12,000 emails. After analysing their header inforamtion, I identified  5,000+ unique email addresses associated with that domain name. This means that <em><strong>potentially </strong></em>5,000+ people had also fell for this lure. </p><p>Just for the sake of curiosity, lets assume that the average price for one such account is Rs. 300. Therefore, by selling it to 5,000 people the seller clocked in Rs. 15,00,000 (USD 17,241 @ Rs. 87/USD) approximately. </p><h4>How are these sellers able to create such accounts?</h4><p>Based on what I have observed, the accounts being sold belong to Microsoft 365 tenants of educational institutions. Microsoft offers Microsoft 365 at discounted prices to educational institutions. These plans include most of the features. Somehow these sellers are able to obtain access to these tenants (their motives and methods are out of scope for this post) and use them for their own gains. </p><h4>Why am I asking you to stay away from these accounts?</h4><ul><li><p>The Microsoft 365 tenant administrator can access all data (email, OneDrive files, etc.) and devices associated with these accounts irrespective of what they mention on their website.</p></li><li><p>Another person can take over the Microsoft 365 tenant if it is not secured properly. For example, the administrator email ID I received was assoicated with another custom domain name. I searched for the availability of that domain name. However, this time I lucked out. That domain name was already registred. </p><p>Let&#8217;s pause for a moment and think through it. Imagine what could have happened had I been able to register that domain name? </p><p><strong>I </strong><em><strong>probably</strong></em><strong> would have been able to take-over their entier Mircrosoft 365 tenant and everything associated with it, including the user data.</strong> </p></li><li><p>I was also able to identify services that were signed-up for using these email addresses. This means that using a simple password reset, one could possibly take over those accounts as well. Also, had the administrator allowed users to reset their password, one would have been able to take over these Microsoft accounts as well and access all of their data. </p></li><li><p>Access to these accounts can be blocked at any time. This can happen either when Microsoft finds out about the abuse of their services or when the domain is added to another Microsoft 365 tenant. For example, I can still add this domain to my Microsoft 365 tenant by reaching out to Microsoft. However, before releasing the domain from the previous tenant, Microsoft will either make all accounts associated with this domain inoperative or map them to a different domain name within the previous tenant. Note that, the catch-all will still keep catching emails sent to any email address associated with this domain name.</p></li></ul><p>Hopefully, after reading this post you will stay away from cheap Microsoft 365 accounts. If not, well, you have been warned.</p><p>Please note: This is not a vulnerability within Microsoft 365 or Office 365. The vulnerability lies in us, the tendency to fall for luring offers.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.udaymittal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Uday Mittal's Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Book Review: Red Team - How to Succeed By Thinking Like the Enemy]]></title><description><![CDATA[Review of the book Red Team - How to Succeed By Thinking Like the Enemy by Micah Zenko. Book published in November 2015 by Basic Books.]]></description><link>https://www.udaymittal.com/p/book-review-red-team-micah-zenko</link><guid isPermaLink="false">https://www.udaymittal.com/p/book-review-red-team-micah-zenko</guid><dc:creator><![CDATA[Uday Mittal]]></dc:creator><pubDate>Sun, 02 Feb 2025 07:01:51 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/2e14c89e-6ddc-4761-b7ba-34386042e339_553x446.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rOk3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F248bca1a-c05f-4e37-a42a-a173a0112d6c_987x1500.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rOk3!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F248bca1a-c05f-4e37-a42a-a173a0112d6c_987x1500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!rOk3!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F248bca1a-c05f-4e37-a42a-a173a0112d6c_987x1500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!rOk3!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F248bca1a-c05f-4e37-a42a-a173a0112d6c_987x1500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!rOk3!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F248bca1a-c05f-4e37-a42a-a173a0112d6c_987x1500.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rOk3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F248bca1a-c05f-4e37-a42a-a173a0112d6c_987x1500.jpeg" width="376" height="571.4285714285714" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/248bca1a-c05f-4e37-a42a-a173a0112d6c_987x1500.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1500,&quot;width&quot;:987,&quot;resizeWidth&quot;:376,&quot;bytes&quot;:51239,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!rOk3!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F248bca1a-c05f-4e37-a42a-a173a0112d6c_987x1500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!rOk3!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F248bca1a-c05f-4e37-a42a-a173a0112d6c_987x1500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!rOk3!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F248bca1a-c05f-4e37-a42a-a173a0112d6c_987x1500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!rOk3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F248bca1a-c05f-4e37-a42a-a173a0112d6c_987x1500.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Continuing on my quest to learn more about red team operations, I picked up the book, <em>Red Team - How to Succeed By Thinking Like the Enemy </em>by <a href="https://www.goodreads.com/author/show/4127288.Micah_Zenko">Micah Zenko</a>. <a href="https://www.udaymittal.com/p/book-review-professional-red-teaming">This time</a> I am not guilty of judging the book by its cover because this book has been on my reading list for some time. I had been delaying reading it because this is not a technical book and has little to do with cyber red team operations. I decided to give it a read as part of my <a href="https://100daysofredteam.com">100 Days of Red Team</a> challange.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.udaymittal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Uday Mittal's Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>It provides a deep exploration of red teaming as a strategic practice. It illustrates how organizations across various domains&#8212;military, intelligence, cybersecurity, and business&#8212;use red team exercises to identify vulnerabilities, challenge assumptions, overcome group think and anticipate threats. The author has presented a well-researched analysis of red team methodologies, their effectiveness, and challenges they face.</p><h3>Content Overview</h3><p>This book is divided into six parts. First part discusses best practices for the success of a red team and for obtaining true value out of a red team exercise. Parts two to five discuss red team case studies across, military, intelligence, homeland security and private sector domain. Part six addresses some misconceptions about red team exercises and also talks about how red teaming might evolve in future.</p><p>The book traces the origins of red teaming, linking it to historical practices like the <a href="https://en.wikipedia.org/wiki/Devil%27s_advocate">Devil&#8217;s Advocate in the Vatican</a>, and explores its modern applications. The author has categorized different types of red team exercises, including simulations, vulnerability probes, and alternative analysis, explaining how they operate within various institutions. Through extensive case studies, the book highlights both successful and failed red team exercises, drawing insights from organizations like the CIA, NYPD, and corporate entities. A key theme is the role of leadership in enabling or hindering red team effectiveness. The authour has also discussed best practices for setting up and running a red team, as well as common pitfalls that can render these efforts ineffective.</p><h3>Salient Features</h3><ul><li><p>Covers red teaming beyond cybersecurity, including its application in business, military, intelligence, and homeland security.</p></li><li><p>Features numerous real-world case studies that provide valuable insights into the benefits and challenges of red teaming.</p></li><li><p>Emphasizes the importance of management buy-in for the success of red team initiatives.</p></li><li><p>Helps readers understand red teaming as a broader strategic concept rather than merely a cybersecurity testing technique.</p></li><li><p>Offers insights into the role of leadership and organizational culture in determining the effectiveness of red teams.</p></li><li><p>Provides practical takeaways for both practitioners and decision-makers interested in leveraging red teaming.</p></li></ul><h3>Not so salient Features</h3><ul><li><p>While the book effectively illustrates the benefits of red teaming through case studies, it could have provided more guidance on cultivating a red team mindset.</p></li><li><p>The focus is more on describing red team outcomes rather than offering a structured methodology for developing red team capabilities.</p></li></ul><h3>My rating 4.5 / 5.0</h3><p>Join my <a href="https://yks.red/discord">Cyber Security book club on Discord</a> and share your views on this book (<em>or any other security book of your choice</em>).</p><h2>Other book reviews</h2><ul><li><p><a href="https://www.udaymittal.com/p/book-review-professional-red-teaming">Professional Red Teaming by Jacob G. Oakley</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-adversarial-tradecraft">Adversarial Tradecraft in Cybersecurity by Dan Borges</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-the-cybersecurity-managers">The Cybersecurity Manager's Guide by Todd Barnum</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-practical-social-engineering">Practical Social Engineering by Joe Gray</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-ethical-hacking">Ethical Hacking by Daniel G. Graham</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-how-to-hack-like-a-ghost">How to Hack Like a GHOST by Sparc Flow</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-how-to-hack-like-a-legend">How to Hack Like a LEGEND by Sparc Flow</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-ccsp-for-dummies">CCSP for dummies by Arthur J. Deane</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-cyber-warfare-truth-tactics">Cyber Warfare &#8211; Truth, Tactics, and Strategies by Dr. Chase Cunningham</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-practical-threat-intelligence">Practical Threat Intelligence and Data-Driven Threat Hunting by Valentina Costa-Gazc&#243;n</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-hacking-api">Hacking APIs by Corey Ball</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-penetration-testing-azure">Penetration Testing Azure for Ethical Hackers by David Okeyode, Karl Fosaaen</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-pentesting-azure-applications">Pentesting Azure Applications by Matt Burrough</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-red-team-development">Red Team Development and Operations by Joe Vest and James Tubberville</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-container-security-by-liz-rice/">Container Security by Liz Rice</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-web-application-security">Web Application Security by Andrew Hoffman</a></p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.udaymittal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Uday Mittal's Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Book Review: Professional Red Teaming]]></title><description><![CDATA[Review of the book Professional Red Teaming by Jacon G. Oakley. Book published in January 2019 by Apress Publication.]]></description><link>https://www.udaymittal.com/p/book-review-professional-red-teaming</link><guid isPermaLink="false">https://www.udaymittal.com/p/book-review-professional-red-teaming</guid><dc:creator><![CDATA[Uday Mittal]]></dc:creator><pubDate>Sun, 29 Dec 2024 07:58:13 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/0470833e-dddc-43a8-b722-5c7533c670ad_536x448.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wTtf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87837747-61ea-4e01-abea-fc80a2f81a1c_827x1181.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wTtf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87837747-61ea-4e01-abea-fc80a2f81a1c_827x1181.jpeg 424w, https://substackcdn.com/image/fetch/$s_!wTtf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87837747-61ea-4e01-abea-fc80a2f81a1c_827x1181.jpeg 848w, https://substackcdn.com/image/fetch/$s_!wTtf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87837747-61ea-4e01-abea-fc80a2f81a1c_827x1181.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!wTtf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87837747-61ea-4e01-abea-fc80a2f81a1c_827x1181.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wTtf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87837747-61ea-4e01-abea-fc80a2f81a1c_827x1181.jpeg" width="376" height="536.9480048367594" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/87837747-61ea-4e01-abea-fc80a2f81a1c_827x1181.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1181,&quot;width&quot;:827,&quot;resizeWidth&quot;:376,&quot;bytes&quot;:89728,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!wTtf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87837747-61ea-4e01-abea-fc80a2f81a1c_827x1181.jpeg 424w, https://substackcdn.com/image/fetch/$s_!wTtf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87837747-61ea-4e01-abea-fc80a2f81a1c_827x1181.jpeg 848w, https://substackcdn.com/image/fetch/$s_!wTtf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87837747-61ea-4e01-abea-fc80a2f81a1c_827x1181.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!wTtf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87837747-61ea-4e01-abea-fc80a2f81a1c_827x1181.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Continuing on my quest to learn more about red team operations, I picked up the book, <em>Professional Red Teaming </em>by Jacob G. Oakley. <a href="https://www.udaymittal.com/p/book-review-adversarial-tradecraft">Once again</a>, I am guilty of judging the book by its cover. This time it turned out to be okayish choice.  This book aims to help readers navigate the intricacies of conducting professional <s>red team</s> offensive security engagements, focusing on operational guidelines, tradecraft, and the human aspects of offensive security. It also introduces a novel concept&#8212;Counter-APT Red Teaming (CAPTR)&#8212;designed to tackle advanced persistent threats (APTs) and offers a comprehensive framework for evaluating offensive security processes.</p><p>Please note that even though this book covers certain technical aspects of offensive security engaements, this is <strong>not a technical book</strong>. It focuses more on the management and process aspect of offensive security engagements.</p><h3>Content Overview</h3><p>The book is organized into 15 chapters that address various facets of offensive security engagements:</p><ol><li><p><strong>Foundations of Red Teaming</strong>: Chapters 1-3 provide an overview of red team operations, the importance of human hackers over automation, and the limitations of modern offensive security engagements compared to real-world adversaries.</p></li><li><p><strong>Process and Execution</strong>: Chapters 4-8 cover the theoretical and procedural aspects of engagements, including scoping, drafting rules of engagement, execution phases, reporting, and the role of purple teaming.</p></li><li><p><strong>CAPTR Teaming</strong>: Chapters 9-12 introduce and elaborate on CAPTR&#8212;a reverse red teaming methodology&#8212;with detailed steps such as scoping, initialization, and execution.</p></li><li><p><strong>Evaluation and Experimentation</strong>: Chapters 13-15 focus on comparing traditional red teaming with CAPTR through a structured framework and a fictional experiment to illustrate their effectiveness.</p></li></ol><h3>Salient Features</h3><ul><li><p>The concept of CAPTR and Reverse Red Teaming is innovative and provides a fresh perspective on addressing APTs, making it potentially valuable for organizations.</p></li><li><p>The book emphasizes the challenges posed by people during offensive security engagements, including the dynamic between adversarial blue and red teams.</p></li><li><p>Chapters 4-8 are a goldmine for understanding the lifecycle of offensive security engagements, with actionable insights on scoping, execution, and reporting.</p></li><li><p>The inclusion of a sample format for operational notes and examples from the author's professional experiences make the content insightful.</p></li><li><p>The guidance is relevant for both internal red teams and external service providers, catering to diverse professional needs.</p></li></ul><h3>Not so salient Features</h3><ul><li><p>The interchangeable use of the terms, red teaming and penetration testing, can mislead readers, especially professionals who understand the critical differences between the two. Referring to them collectively as "offensive security engagements" could have resolved this ambiguity.</p></li><li><p>Certain scenarios, such as assuming an organization undergoing a red team exercise lacks a vulnerability management program, seem disconnected from reality.</p></li><li><p>The tone, particularly in the initial chapters, leans heavily toward criticism, which may not resonate well with all readers.</p></li><li><p>The book contains some spelling and grammatical inconsistencies, which may distract readers at times. Addressing these issues in future editions would enhance the overall reading experience and professionalism of the content.</p></li></ul><h3>My rating 3.5 / 5.0</h3><p>Join my <a href="https://yks.red/discord">Cyber Security book club on Discord</a> and share your views on this book (<em>or any other security book of your choice</em>).</p><h2>Other book reviews</h2><ul><li><p><a href="https://www.udaymittal.com/p/book-review-adversarial-tradecraft">Adversarial Tradecraft in Cybersecurity by Dan Borges</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-the-cybersecurity-managers">The Cybersecurity Manager's Guide by Todd Barnum</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-practical-social-engineering">Practical Social Engineering by Joe Gray</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-ethical-hacking">Ethical Hacking by Daniel G. Graham</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-how-to-hack-like-a-ghost">How to Hack Like a GHOST by Sparc Flow</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-how-to-hack-like-a-legend">How to Hack Like a LEGEND by Sparc Flow</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-ccsp-for-dummies">CCSP for dummies by Arthur J. Deane</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-cyber-warfare-truth-tactics">Cyber Warfare &#8211; Truth, Tactics, and Strategies by Dr. Chase Cunningham</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-practical-threat-intelligence">Practical Threat Intelligence and Data-Driven Threat Hunting by Valentina Costa-Gazc&#243;n</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-hacking-api">Hacking APIs by Corey Ball</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-penetration-testing-azure">Penetration Testing Azure for Ethical Hackers by David Okeyode, Karl Fosaaen</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-pentesting-azure-applications">Pentesting Azure Applications by Matt Burrough</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-red-team-development">Red Team Development and Operations by Joe Vest and James Tubberville</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-container-security-by-liz-rice/">Container Security by Liz Rice</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-web-application-security">Web Application Security by Andrew Hoffman</a></p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.udaymittal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Uday Mittal&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Book Review: Adversarial Tradecraft in Cybersecurity]]></title><description><![CDATA[Review of the book Adversarial Tradecraft in Cybersecurity by Dan Borges. Book published in June 2021 by Packt Publication.]]></description><link>https://www.udaymittal.com/p/book-review-adversarial-tradecraft</link><guid isPermaLink="false">https://www.udaymittal.com/p/book-review-adversarial-tradecraft</guid><dc:creator><![CDATA[Uday Mittal]]></dc:creator><pubDate>Sat, 14 Dec 2024 10:30:55 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/b83f07f6-0514-4749-8c7a-233b72808def_1103x429.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!J8nL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F097891a3-209f-48c1-8d62-c7bbe82b444c_1103x1360.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!J8nL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F097891a3-209f-48c1-8d62-c7bbe82b444c_1103x1360.heic 424w, https://substackcdn.com/image/fetch/$s_!J8nL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F097891a3-209f-48c1-8d62-c7bbe82b444c_1103x1360.heic 848w, https://substackcdn.com/image/fetch/$s_!J8nL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F097891a3-209f-48c1-8d62-c7bbe82b444c_1103x1360.heic 1272w, https://substackcdn.com/image/fetch/$s_!J8nL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F097891a3-209f-48c1-8d62-c7bbe82b444c_1103x1360.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!J8nL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F097891a3-209f-48c1-8d62-c7bbe82b444c_1103x1360.heic" width="428" height="527.7243880326382" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/097891a3-209f-48c1-8d62-c7bbe82b444c_1103x1360.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1360,&quot;width&quot;:1103,&quot;resizeWidth&quot;:428,&quot;bytes&quot;:135124,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!J8nL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F097891a3-209f-48c1-8d62-c7bbe82b444c_1103x1360.heic 424w, https://substackcdn.com/image/fetch/$s_!J8nL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F097891a3-209f-48c1-8d62-c7bbe82b444c_1103x1360.heic 848w, https://substackcdn.com/image/fetch/$s_!J8nL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F097891a3-209f-48c1-8d62-c7bbe82b444c_1103x1360.heic 1272w, https://substackcdn.com/image/fetch/$s_!J8nL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F097891a3-209f-48c1-8d62-c7bbe82b444c_1103x1360.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In my quest to deepen my understanding of <a href="https://courses.yaksas.in/p/adversary-emulation-101-mimicking-a-real-world-cyber-attack/?product_id=2250813">red team operations and adversary emulation</a>, I stumbled upon the book, <em>Adversarial Tradecraft in Cybersecurity</em> by Dan Borges. To be honest, its title immediately caught my attention (yes, I am guilty of judging the book by cover but it turned out to be a good decision ). This book provides actionable guidance for both attackers and defenders. I got it through the <a href="https://www.humblebundle.com/books">Humble Bundle</a> by Packt. It was published in June 2021. </p><h3>Content Overview</h3><p>Each chapter is divided into two subsections, offensive and defensive perspectives, making it a comprehensive guide for professionals on both sides of the cybersecurity spectrum.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.udaymittal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Uday Mittal&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>The book begins with an introduction to adversarial operations and the principles of computer conflict, exploring core concepts like deception, humanity. It guides readers through the essentials of planning, setting up infrastructure, and equipping teams with the necessary tools.</p><p>It then covers techniques, from both, offensive and defensive perspectives, to gain a tactical edge by remaining undetected, blending into the opponent&#8217;s techniques, and discerning the motivations and capabilities of other actors. It also delves into tampering with opponents' abilities to detect your presence and using advanced research to conclude operations effectively. </p><p>Throughout the text, the book covers practical examples that cater to a wide audience, from penetration testers and red teamers to incident responders and security engineers. </p><h3>Salient Features</h3><ul><li><p>Each chapter presents both offensive and defensive viewpoints, providing a holistic understanding of adversarial operations.</p></li><li><p>The content is grounded in the author&#8217;s extensive experience, offering valuable, actionable insights.</p></li><li><p>The book introduces a plethora of tools spanning offensive, defensive, and forensic domains, many of which were new to me.</p></li><li><p>It highlights the importance of deception strategies in both offense and defense, a critical yet often underemphasized aspect of cybersecurity.</p></li><li><p>The book offers numerous techniques and strategies applicable to offense-defense game type scenarios.</p></li><li><p>It serves as a valuable resource for experienced cybersecurity professionals, including CISOs and managers, and is excellent for a quick refresher on key concepts, tools, and techniques.</p></li></ul><h3>Not so salient Features</h3><ul><li><p>The book&#8217;s breadth of concepts can be daunting for newcomers to the field, despite clear explanations.</p></li><li><p>Many strategies are tailored to simulated offense-defense game type scenarios and may have constrained applicability in practical settings.</p></li><li><p>While informative, the book could have been structured better to enhance readability and flow.</p></li></ul><h3>My rating 4.0 / 5.0</h3><p>Join our <a href="https://yks.red/discord">book club on Discord</a> and share your views on this book (<em>or any other security book of your choice</em>).</p><h2>Other book reviews</h2><ul><li><p><a href="https://www.udaymittal.com/p/book-review-the-cybersecurity-managers">The Cybersecurity Manager's Guide by Todd Barnum</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-practical-social-engineering">Practical Social Engineering by Joe Gray</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-ethical-hacking">Ethical Hacking by Daniel G. Graham</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-how-to-hack-like-a-ghost">How to Hack Like a GHOST by Sparc Flow</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-how-to-hack-like-a-legend">How to Hack Like a LEGEND by Sparc Flow</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-ccsp-for-dummies">CCSP for dummies by Arthur J. Deane</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-cyber-warfare-truth-tactics">Cyber Warfare &#8211; Truth, Tactics, and Strategies by Dr. Chase Cunningham</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-practical-threat-intelligence">Practical Threat Intelligence and Data-Driven Threat Hunting by Valentina Costa-Gazc&#243;n</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-hacking-api">Hacking APIs by Corey Ball</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-penetration-testing-azure">Penetration Testing Azure for Ethical Hackers by David Okeyode, Karl Fosaaen</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-pentesting-azure-applications">Pentesting Azure Applications by Matt Burrough</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-red-team-development">Red Team Development and Operations by Joe Vest and James Tubberville</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-container-security-by-liz-rice/">Container Security by Liz Rice</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-web-application-security">Web Application Security by Andrew Hoffman</a></p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.udaymittal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Uday Mittal&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Book Review: Web Application Security]]></title><description><![CDATA[Review of the book Web Application Security by Andrew Hoffman. Published in March 2020 by O'Reilly Publication.]]></description><link>https://www.udaymittal.com/p/book-review-web-application-security</link><guid isPermaLink="false">https://www.udaymittal.com/p/book-review-web-application-security</guid><dc:creator><![CDATA[Uday Mittal]]></dc:creator><pubDate>Mon, 21 Oct 2024 06:13:58 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/6b19ed90-e458-4d6a-b760-e454b16c8323_1033x669.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0rzH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff29ad55-54ac-448d-83ce-d377469c37d0_780x1024.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0rzH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff29ad55-54ac-448d-83ce-d377469c37d0_780x1024.jpeg 424w, https://substackcdn.com/image/fetch/$s_!0rzH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff29ad55-54ac-448d-83ce-d377469c37d0_780x1024.jpeg 848w, https://substackcdn.com/image/fetch/$s_!0rzH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff29ad55-54ac-448d-83ce-d377469c37d0_780x1024.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!0rzH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff29ad55-54ac-448d-83ce-d377469c37d0_780x1024.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0rzH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff29ad55-54ac-448d-83ce-d377469c37d0_780x1024.jpeg" width="458" height="601.2717948717949" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ff29ad55-54ac-448d-83ce-d377469c37d0_780x1024.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:780,&quot;resizeWidth&quot;:458,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!0rzH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff29ad55-54ac-448d-83ce-d377469c37d0_780x1024.jpeg 424w, https://substackcdn.com/image/fetch/$s_!0rzH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff29ad55-54ac-448d-83ce-d377469c37d0_780x1024.jpeg 848w, https://substackcdn.com/image/fetch/$s_!0rzH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff29ad55-54ac-448d-83ce-d377469c37d0_780x1024.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!0rzH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff29ad55-54ac-448d-83ce-d377469c37d0_780x1024.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I recently came across this book, Web Application Security by Andrew Hoffman, while searching for material to read on how to secure web applications. There are many books available on this topic. I picked this one specifically because of it's recent publication date. It was published in March 2020 (about 5 month back, at the time of writing).</p><h2>Content overview</h2><p>The tagline of the book, "Exploitation and Countermeasures for Modern Web Applications", says it all. The book is divided into three parts Recon, Offense and Defense, each part is then divided into chapters covering specific areas of web application security.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.udaymittal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Uday Mittal&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>It starts by providing a glimpse into the history of software security and the evolution of web related attacks as we see them today. It lays the foundation for the first part, Recon. In this part the author describes various techniques for mapping a web application. One important lesson I learnt from this part is that recon is not just limited to the web application per se. When mapping out the web application, one needs to look at aspects such as:</p><ul><li><p>Structure of the application</p></li><li><p>Subdomains</p></li><li><p>APIs</p></li><li><p>Third-party components</p></li><li><p>Architecture</p></li></ul><p>The second part of the book, Offense, covers the most common attacks related to web applications:</p><ul><li><p>Cross-site scripting (XSS)</p></li><li><p>Cross-site request forgery (CSRF)</p></li><li><p>XML External Entity (XXE)</p></li><li><p>Injection</p></li><li><p>Denial of Service (DoS and DDoS)</p></li><li><p>Exploiting third-party components</p></li></ul><p>In Defense (third part of this book), the author looks at securing web applications from a developer's point of view (one of the things I liked about this book). This part covers the following:</p><ul><li><p>Securing application architecture</p></li><li><p>Secure code reviews</p></li><li><p>Vulnerability discovery and management</p></li><li><p>Defense techniques for each attack mentioned in the Offense section</p></li></ul><h2>Salient features</h2><p>Here are a few things I liked about this book:</p><ul><li><p>It focuses on holistic view of securing web applications.</p></li><li><p>Each offense technique is mapped to appropriate defense(s).</p></li><li><p>Developer focused Defense part of the book.</p></li><li><p>Author's focus on the importance of taking notes and his preferred notes format (you can find this out by reading the book).</p></li><li><p>This book is good for developers, information security managers, beginners in web application security.</p></li></ul><h2>Not so salient features</h2><p>Here are a few things I did not like about this book:</p><ul><li><p>Given the title and tag line, I thought it would be fairly more technical. It did not live up to those expectations.</p></li><li><p>The offense part misses out on key web application attacks such as Local File Inclusion (LFI), Remote File Inclusion (RFI), Path Traversal, Insecure Direct Object Reference etc.</p></li><li><p>Author has included examples for a fictitious website, a hands-on lab would have been nice.</p></li></ul><h4>My rating: <strong>4.0 / 5.0</strong></h4><p>Join our <a href="https://yks.red/discord">book club on Discord</a> and share your views on this book (<em>or any other security book of your choice</em>).</p><h2>Other book reviews</h2><ul><li><p><a href="https://www.udaymittal.com/p/book-review-the-cybersecurity-managers">The Cybersecurity Manager's Guide by Todd Barnum</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-practical-social-engineering">Practical Social Engineering by Joe Gray</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-ethical-hacking">Ethical Hacking by Daniel G. Graham</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-how-to-hack-like-a-ghost">How to Hack Like a GHOST by Sparc Flow</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-how-to-hack-like-a-legend">How to Hack Like a LEGEND by Sparc Flow</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-ccsp-for-dummies">CCSP for dummies by Arthur J. Deane</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-cyber-warfare-truth-tactics">Cyber Warfare &#8211; Truth, Tactics, and Strategies by Dr. Chase Cunningham</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-practical-threat-intelligence">Practical Threat Intelligence and Data-Driven Threat Hunting by Valentina Costa-Gazc&#243;n</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-hacking-api">Hacking APIs by Corey Ball</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-penetration-testing-azure">Penetration Testing Azure for Ethical Hackers by David Okeyode, Karl Fosaaen</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-pentesting-azure-applications">Pentesting Azure Applications by Matt Burrough</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-red-team-development">Red Team Development and Operations by Joe Vest and James Tubberville</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-container-security-by-liz-rice/">Container Security by Liz Rice</a></p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.udaymittal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Uday Mittal&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Book Review: Container Security]]></title><description><![CDATA[Review of the book Container Security by Liz Rice. Published in April 2020 by O'Reilly Publication.]]></description><link>https://www.udaymittal.com/p/book-review-container-security-by</link><guid isPermaLink="false">https://www.udaymittal.com/p/book-review-container-security-by</guid><dc:creator><![CDATA[Uday Mittal]]></dc:creator><pubDate>Sun, 20 Oct 2024 06:01:41 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/274ba592-f5e0-4ee0-b787-a78cc0a9adf5_1184x661.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!eWN6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6de6a8ce-9719-4145-ad2a-f0d378992076_371x489.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!eWN6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6de6a8ce-9719-4145-ad2a-f0d378992076_371x489.png 424w, https://substackcdn.com/image/fetch/$s_!eWN6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6de6a8ce-9719-4145-ad2a-f0d378992076_371x489.png 848w, https://substackcdn.com/image/fetch/$s_!eWN6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6de6a8ce-9719-4145-ad2a-f0d378992076_371x489.png 1272w, https://substackcdn.com/image/fetch/$s_!eWN6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6de6a8ce-9719-4145-ad2a-f0d378992076_371x489.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!eWN6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6de6a8ce-9719-4145-ad2a-f0d378992076_371x489.png" width="445" height="586.5363881401618" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6de6a8ce-9719-4145-ad2a-f0d378992076_371x489.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:489,&quot;width&quot;:371,&quot;resizeWidth&quot;:445,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!eWN6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6de6a8ce-9719-4145-ad2a-f0d378992076_371x489.png 424w, https://substackcdn.com/image/fetch/$s_!eWN6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6de6a8ce-9719-4145-ad2a-f0d378992076_371x489.png 848w, https://substackcdn.com/image/fetch/$s_!eWN6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6de6a8ce-9719-4145-ad2a-f0d378992076_371x489.png 1272w, https://substackcdn.com/image/fetch/$s_!eWN6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6de6a8ce-9719-4145-ad2a-f0d378992076_371x489.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I recently came across this book, <a href="https://learning.oreilly.com/library/view/container-security/9781492056690/">Container Security by Liz Rice</a>, while searching for material to read on how to secure containerized applications. This was the only book I could find on the topic, so I picked it up without thinking further. It was published in April 2020.</p><h2>Content overview</h2><p>The book's tagline, "Fundamental Technology Concepts that Protect Containerized Applications", provides an apt description of the content. It starts with basic concepts which are necessary to understand before we set out to secure containers. Even though the book is divided into 14 chapters, they can be rolled up into following three broad categories:</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.udaymittal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Uday Mittal&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><ul><li><p><strong>How containers work or, more aptly, what makes containers possible?</strong> - Chapters 2-5. In these chapters the author provides a brief introduction to various Linux components, such as Namespaces, Control Groups, Sys calls, Permissions, Capabilities etc. that work together to enable the technology we know as Containers. After all, <em>a container is still a Linux process running on the host machine</em>. This part ends by giving a bird's eye view of virtual machines and how containers are different from VMs.</p></li><li><p><strong>Securing various aspects of containers</strong> - Chapters 6-13. In each of these chapters the author describes a facet of containers and also provides recommendations on securing it. For example, in chapter 6 she describes how container images are built and also provides security best practices to protect container images. This part also covers concepts like rootless containers, Kata containers, Unikernels etc.</p></li><li><p><strong>Container security threats, recommendations and checklist - </strong>Chapter 1, 14 and security checklist. In the first chapter the author covers various threats associated with containers and provides mitigations to address them. The author has also provided a container threat model in this chapter. In chapter 14, the author maps various vulnerabilities associated with containers to OWASP Top 10. Finally, at the end of the book the author has also provided a security checklist based on her recommendations throughout the book.</p></li></ul><h2>Salient features</h2><p>Here are a few things I liked about this book:</p><ul><li><p>Good coverage of container threats and security best practices.</p></li><li><p>It builds the foundation by describing how containers work on the ground. This understanding is fundamental for learning how to secure containers.</p></li><li><p>The author had provided a lot of useful commands for enumerating containers (they are spread throughout the book and not covered specifically under this heading).</p></li><li><p>The author has also provided various tools that can be used to secure containers.</p></li><li><p>It is written in an easy to understand manner despite being technical in nature.</p></li><li><p>Security checklist at the end of the book.</p></li><li><p>At 180 pages, it's short and concise. Packed with a lot of useful information.</p></li><li><p>This book is good for developers working on containerized applications, cloud security professionals, security managers and red teamers.</p></li></ul><h2>Not so salient features</h2><p>Here are a few things I did not like about this book:</p><ul><li><p>None.</p></li></ul><h4><strong>My rating: 5.0 / 5.0</strong></h4><p>Join our <a href="https://yks.red/discord">book club on Discord</a> and share your views on this book (<em>or any other security book of your choice</em>).</p><h2>Other book reviews</h2><ul><li><p><a href="https://www.udaymittal.com/p/book-review-the-cybersecurity-managers">The Cybersecurity Manager's Guide by Todd Barnum</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-practical-social-engineering">Practical Social Engineering by Joe Gray</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-ethical-hacking">Ethical Hacking by Daniel G. Graham</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-how-to-hack-like-a-ghost">How to Hack Like a GHOST by Sparc Flow</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-how-to-hack-like-a-legend">How to Hack Like a LEGEND by Sparc Flow</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-ccsp-for-dummies">CCSP for dummies by Arthur J. Deane</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-cyber-warfare-truth-tactics">Cyber Warfare &#8211; Truth, Tactics, and Strategies by Dr. Chase Cunningham</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-practical-threat-intelligence">Practical Threat Intelligence and Data-Driven Threat Hunting by Valentina Costa-Gazc&#243;n</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-hacking-api">Hacking APIs by Corey Ball</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-penetration-testing-azure">Penetration Testing Azure for Ethical Hackers by David Okeyode, Karl Fosaaen</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-pentesting-azure-applications">Pentesting Azure Applications by Matt Burrough</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-red-team-development">Red Team Development and Operations by Joe Vest and James Tubberville</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-web-application-security-by-andrew-hoffman/">Web Application Security by Andrew Hoffman</a></p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.udaymittal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Uday Mittal&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Mona.py for exploit devs: 6 must know commands]]></title><description><![CDATA[Six mona.py commands I regularily use during exploit development. They help me speed up the entire process. Watch the video for demonstartion.]]></description><link>https://www.udaymittal.com/p/monapy-for-exploit-devs-6-must-know-commands</link><guid isPermaLink="false">https://www.udaymittal.com/p/monapy-for-exploit-devs-6-must-know-commands</guid><dc:creator><![CDATA[Uday Mittal]]></dc:creator><pubDate>Sat, 19 Oct 2024 17:41:00 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/a095b87a-6e17-4767-9c29-06b9fa154e39_457x317.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>When it comes to exploit development for Microsoft Windows, Mona.py is the go to library for most security researchers. In this post I list six commands that I use often. Watch the video for demonstration.</p><h3>What is Mona.py?</h3><ul><li><p>A pycommand for Immunity Debugger, designed and developed to aid the exploit development process</p></li><li><p>Automates various tasks such as address search, pattern generation and comparison, egg hunter generation etc.</p></li><li><p>Replaces pvefindaddr</p></li><li><p>Developed by Corelanc0d3r (Peter Van Eeckhoutte)</p></li><li><p>Official link: http://bit.ly/mona-py</p></li></ul><h3>Command 1: Set workingfolder</h3><ul><li><p>Sets the working directory for mona to store command output and related files:</p><ul><li><p><strong>!mona config -set workingfolder c:\logs\%p</strong></p></li></ul></li><li><p>This will tell mona to write the output to subfolders of c:\logs. The %p variable will be replaced with the process name currently being debugged.</p></li><li><p>If you want to further group output, you can even use the %i variable in the workingfolder parameter. This variable will get replaced with the process ID of the application being debugged.</p></li></ul><h3>Command 2: bytearray</h3><ul><li><p>Generates an array of hex bytes from \x00 to \xff (except for the excluded ones):</p><ul><li><p><strong>!mona</strong> <strong>bytearray</strong></p></li></ul></li><li><p>Produces two files: text and binary</p></li><li><p>Takes two flags:</p><ul><li><p>-b &#8211; to exclude bytes from array</p></li><li><p>-r &#8211; to output array in the reverse order (\xff..\x00)</p></li></ul></li><li><p>Use compare command to automate the comparison process:</p><ul><li><p><strong>!mona compare &#8211;f &lt;filename&gt; -a &lt;address&gt;</strong></p></li></ul></li></ul><h3>Command 3: pc, po &amp; findmsp</h3><ul><li><p>Generates a cyclic pattern (Metasploit pattern) of a given size and length:</p><ul><li><p><strong>!mona pc &lt;length&gt;</strong></p></li></ul></li><li><p>Locates given four bytes in a cyclic pattern and returns the offset:</p><ul><li><p><strong>!mona po &lt;bytes&gt;</strong></p></li></ul></li><li><p>Find instances of the cyclic pattern:</p><ul><li><p><strong>!mona</strong> <strong>findmsp</strong></p></li></ul></li><li><p>Optional argument:</p><ul><li><p><strong>-distance </strong>Sets the distance from ESP to begin search from</p></li></ul></li></ul><h3>Command 4: egg</h3><ul><li><p>Creates an egghunter routine with a default tag (w00t):</p><ul><li><p><strong>!mona egg</strong></p></li></ul></li><li><p>Optional arguments:</p><ul><li><p>-t : tag (ex: w00t). Default value is w00t</p></li><li><p>-c : enable checksum routine. Only works in conjunction with parameter -f</p></li><li><p>-f : file containing the shellcode</p></li><li><p>-depmethod : method can be &#8220;virtualprotect&#8221;, &#8220;copy&#8221; or &#8220;copy_size&#8221;</p></li><li><p>-depreg : sets the register that contains a pointer to the API function to bypass DEP. By default this register is set to ESI</p></li><li><p>-depsize : sets the size for the dep bypass routine</p></li><li><p>-depdest : this register points to the location of the egghunter itself.</p></li></ul></li></ul><h3>Command 5: jmp</h3><ul><li><p>Searches for pointers that will lead to execution of the code located at the address pointed by a given register:</p><ul><li><p><strong>!mona</strong> <strong>jmp &#8211;r &lt;register&gt;</strong></p></li></ul></li><li><p>Default module criteria : skip aslr and rebase modules. The search will include OS modules by default, but this can be overruled by using the -cm os=false global option.</p></li></ul><h3>Command 6: seh</h3><ul><li><p>Searches for pointers to routines that will lead to code execution in a SEH overwrite exploit:</p><ul><li><p><strong>!mona</strong> <strong>seh</strong></p></li></ul></li><li><p>By default, it will attempt to bypass SafeSEH by excluding pointers from rebase, aslr and safeseh protected modules.</p></li><li><p>The optional -all parameter, if specified, will also search for pointers in memory locations outside of loaded modules.</p></li></ul><h3>Watch the video</h3><div id="youtube2-E1WztWHv4bY" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;E1WztWHv4bY&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/E1WztWHv4bY?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h3>Learn the art of exploit development</h3><p>If you want to learn the art of exploit development check out our Hands-on courses:</p><ul><li><p><a href="https://www.udemy.com/course/hands-on-fuzzing-and-exploit-development-basic/">Hands-on Exploit Development</a></p></li><li><p><a href="https://www.udemy.com/course/hands-on-exploit-development-advanced/">Hands-on Exploit Development (Advanced)</a></p></li><li><p><a href="https://www.udemy.com/course/immunity-debugger-yaksas-csc-lab-essentials/">Immunity Debugger for Exploit Devs - YCSC Lab Essentials</a></p></li></ul>]]></content:encoded></item><item><title><![CDATA[Book Review: Red Team Development and Operations]]></title><description><![CDATA[Review of the book Red Team Development and Operations by Joe Vest and James Tubberville. Published in January 2020.]]></description><link>https://www.udaymittal.com/p/book-review-red-team-development</link><guid isPermaLink="false">https://www.udaymittal.com/p/book-review-red-team-development</guid><dc:creator><![CDATA[Uday Mittal]]></dc:creator><pubDate>Sat, 19 Oct 2024 05:51:19 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/9e3288f6-6708-4460-870a-8365e18f1d85_712x284.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!dOO1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F850a41ea-2c5d-4ed8-8841-568f1c608045_907x1360.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dOO1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F850a41ea-2c5d-4ed8-8841-568f1c608045_907x1360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!dOO1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F850a41ea-2c5d-4ed8-8841-568f1c608045_907x1360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!dOO1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F850a41ea-2c5d-4ed8-8841-568f1c608045_907x1360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!dOO1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F850a41ea-2c5d-4ed8-8841-568f1c608045_907x1360.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dOO1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F850a41ea-2c5d-4ed8-8841-568f1c608045_907x1360.jpeg" width="392" height="587.7839029768468" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/850a41ea-2c5d-4ed8-8841-568f1c608045_907x1360.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1360,&quot;width&quot;:907,&quot;resizeWidth&quot;:392,&quot;bytes&quot;:96471,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!dOO1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F850a41ea-2c5d-4ed8-8841-568f1c608045_907x1360.jpeg 424w, https://substackcdn.com/image/fetch/$s_!dOO1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F850a41ea-2c5d-4ed8-8841-568f1c608045_907x1360.jpeg 848w, https://substackcdn.com/image/fetch/$s_!dOO1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F850a41ea-2c5d-4ed8-8841-568f1c608045_907x1360.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!dOO1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F850a41ea-2c5d-4ed8-8841-568f1c608045_907x1360.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I recently picked up this book, <a href="https://redteam.guide/">Red Team Development and Operations by Joe Vest and James Tubberville</a>, while searching for material to read on Red Teaming. While this is not the only book on the subject, I was intrigued by the 'Zero-Day Edition' (along with this content, of course). Also, it was published recently (at the time of writing), in January 2020.</p><h2>Content Overview</h2><p>The authors have designed this book to be a 'practical guide'. This means that the concepts and tips from this book can be directly applied to real-world red team engagements. The content is organized to align with various phases of a red team engagement.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.udaymittal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Uday Mittal&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>There are six sections in this book:</p><ul><li><p><strong>Introduction</strong> - This section establishes the context for rest of the book. It describes basics such as threats, vulnerability assessments, penetration testing, red teaming, red team goals, red team organization etc. It also lists out differences between a vulnerability assessment, a penetration test and a red team engagement.</p></li><li><p><strong>Engagement Planning</strong> - As the name suggests, this section describes the planning phase in detail. The authors cover various areas, such as scoping, team size, costs, roles and responsibilities, rules of engagement, scenario models, execution phases etc., that go into planning a red team engagement. There's a lot of information packed in this chapter as the authors believe planning is the most important phase of an engagement.</p></li><li><p><strong>Engagement Execution</strong> - This section covers the execution phase of a red team engagement. Authors' focus in this section is on data collection, activity and operator logs, understanding and implementing an adversary's TTPs, command and control center etc.</p></li><li><p><strong>Engagement Culmination</strong> - This section describes activities that should be performed after the execution phase. These include verifying operator logs, removing any sensitive artifacts, executive and technical briefings.</p></li><li><p><strong>Engagement Reporting</strong> - Finally, the authors describe how an engagement report should be prepared. What should be included and what not. The authors emphasize that a red team engagement report should be a chronological story-driven report.</p></li><li><p><strong>Summary and Conclusion</strong> - This section contains the closing remarks from the authors and a summary of earlier chapters.</p></li></ul><h2>Salient features</h2><p>Here are a few things I liked about this book:</p><ul><li><p>I got to learn some new red teaming concepts such as C2 tiers, C2 re-directors, domain fronting, de-confliction, two person integrity etc.</p></li><li><p>It is written in a simple and easy to understand manner.</p></li><li><p>Authors have included some interesting puzzles (thought exercises) at the end of the book.</p></li><li><p>The <a href="https://redteam.guide/">companion website</a> provides a lot of ready-to-use material.</p></li><li><p>Provides a good starting point for understanding and conducting a red team engagement.</p></li><li><p>It is good for penetration testers, new red teamers, information security managers and executives of organizations opting for a red team engagement.</p></li></ul><h2>Not so salient features</h2><p>Here are a few things I did not like about this book:</p><ul><li><p>There are too many things covered for a book of this length and size.</p></li><li><p>It gets repetitive at certain points, to the extent that same text is copy-pasted in multiple sub-sections.</p></li><li><p>It just dips into technical aspects of red teaming, there's no deep-dive.</p></li><li><p>I found the content organization to be a bit haphazard.</p></li></ul><h3>My rating 4.0 / 5.0</h3><p>Join our <a href="https://yks.red/discord">book club on Discord</a> and share your views on this book (<em>or any other security book of your choice</em>).</p><p>UPDATE (14/12/2024): I updated the book&#8217;s rating from 3.6 to 4.0. I recently re-read this book and realised that despite its drawbacks, it packs lots of useful insights .  </p><h2>Other book reviews</h2><ul><li><p><a href="https://www.udaymittal.com/p/book-review-the-cybersecurity-managers">The Cybersecurity Manager's Guide by Todd Barnum</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-practical-social-engineering">Practical Social Engineering by Joe Gray</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-ethical-hacking">Ethical Hacking by Daniel G. Graham</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-how-to-hack-like-a-ghost">How to Hack Like a GHOST by Sparc Flow</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-how-to-hack-like-a-legend">How to Hack Like a LEGEND by Sparc Flow</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-ccsp-for-dummies">CCSP for dummies by Arthur J. Deane</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-cyber-warfare-truth-tactics">Cyber Warfare &#8211; Truth, Tactics, and Strategies by Dr. Chase Cunningham</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-practical-threat-intelligence">Practical Threat Intelligence and Data-Driven Threat Hunting by Valentina Costa-Gazc&#243;n</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-hacking-api">Hacking APIs by Corey Ball</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-penetration-testing-azure">Penetration Testing Azure for Ethical Hackers by David Okeyode, Karl Fosaaen</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-pentesting-azure-applications">Pentesting Azure Applications by Matt Burrough</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-container-security-by-liz-rice/">Container Security by Liz Rice</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-web-application-security-by-andrew-hoffman/">Web Application Security by Andrew Hoffman</a></p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.udaymittal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Uday Mittal&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Seven Common Cryptography Attacks]]></title><description><![CDATA[Discover the seven most common cryptography attacks, including brute force, ciphertext-only, and differential cryptanalysis, and how they impact security.]]></description><link>https://www.udaymittal.com/p/seven-common-cryptography-attacks</link><guid isPermaLink="false">https://www.udaymittal.com/p/seven-common-cryptography-attacks</guid><dc:creator><![CDATA[Uday Mittal]]></dc:creator><pubDate>Fri, 18 Oct 2024 09:45:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!4-oo!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eca86ff-0051-4405-b74f-74d582ba8c15_561x561.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Cryptography, the cornerstone of data security, is under constant threat from attackers employing various techniques to crack encrypted data. In this article, we explore seven prominent cryptographic attacks and how they exploit weaknesses in cryptographic systems.</p><h4>1. Chosen-Ciphertext Attacks</h4><p>In a chosen-ciphertext attack, the attacker can choose a piece of ciphertext and obtain its decrypted plaintext. This is especially dangerous because the attacker can manipulate the ciphertext to trick the system into revealing information about the encryption key or algorithm. Chosen-ciphertext attacks are often used in practical applications, such as in padding oracle attacks. Defenses against these attacks include the use of authenticated encryption, which ensures both confidentiality and integrity of the message.</p><h4>2. Chosen-Plaintext Attacks</h4><p>Chosen-plaintext attacks involve the attacker selecting specific plaintexts and obtaining the corresponding ciphertexts. This enables the attacker to study how the encryption algorithm transforms specific data, potentially revealing weaknesses in the algorithm or the key. Adaptive chosen-plaintext attacks, where the attacker iteratively adjusts the plaintext based on results, can be particularly dangerous. Robust cryptographic algorithms that mask predictable transformations reduce the likelihood of success in such attacks.</p><h4>3. Key and Algorithm Attacks</h4><p>Key and algorithm attacks target the cryptographic algorithms themselves, aiming to uncover vulnerabilities in their design or implementation. Attackers may exploit weaknesses in how keys are generated, distributed, or managed, potentially bypassing encryption without needing to break the algorithm itself. This can include attacks such as poor random number generation or weak key lengths, making it easier for an adversary to guess the key. These attacks highlight the importance of using robust, thoroughly vetted cryptographic algorithms and ensuring secure key management practices.</p><h4>4. Ciphertext-Only Attacks</h4><p>In a ciphertext-only attack, the attacker has access only to the encrypted data (ciphertext) and attempts to deduce the corresponding plaintext or the encryption key. This type of attack is especially challenging because the attacker has minimal information. However, if the encryption algorithm or key has flaws, or if statistical analysis can reveal patterns, the attacker may succeed. Strong encryption methods that produce highly randomized ciphertexts help mitigate this risk.</p><h4>5. Differential Cryptanalysis</h4><p>Differential cryptanalysis is a sophisticated method used primarily against block ciphers. It involves analyzing how small differences in plaintext inputs result in differences in ciphertext outputs. By studying these patterns, an attacker can deduce information about the key. Differential cryptanalysis is most effective when the cryptographic algorithm lacks sufficient complexity or randomness. Many modern encryption algorithms, like AES, are designed with countermeasures to thwart differential cryptanalysis, including the use of S-boxes that obscure predictable patterns.</p><h4>6. Brute Force Attacks</h4><p>Brute force attacks rely on sheer computational power to try every possible key until the correct one is found. While this method is time-consuming and resource-intensive, it remains feasible if the key length is too short. Modern advances in computing power, including the use of GPUs and quantum computing, have made brute force attacks more threatening. To defend against brute force attacks, encryption keys must be long and complex, making it exponentially harder for attackers to test all potential combinations.</p><h4>7. Known-Plaintext Attacks</h4><p>In known-plaintext attacks, the attacker has access to both the plaintext and its corresponding ciphertext. By analyzing the relationship between the two, the attacker may be able to determine the key used for encryption. This type of attack is particularly concerning when certain parts of a message are predictable or when standard templates are used. Modern encryption techniques such as block cipher modes of operation, which add randomness to the encryption process, help protect against known-plaintext attacks.</p><h3>Conclusion</h3><p>Understanding these cryptographic attacks is crucial for developing more secure systems. Cryptography must be continuously strengthened to stay ahead of adversaries, and organizations should always use the latest and most secure algorithms to protect sensitive data. From key and algorithm vulnerabilities to complex cryptanalysis techniques, staying informed about these attacks is the first step toward robust security.</p><p>How do you think quantum computing will impact the future of cryptographic security?</p>]]></content:encoded></item><item><title><![CDATA[Book Review: The Cybersecurity Manager's Guide ]]></title><description><![CDATA[Review of the book The Cybersecurity Manager's Guide by odd Barnum. Book published in March 2021.]]></description><link>https://www.udaymittal.com/p/book-review-the-cybersecurity-managers</link><guid isPermaLink="false">https://www.udaymittal.com/p/book-review-the-cybersecurity-managers</guid><dc:creator><![CDATA[Uday Mittal]]></dc:creator><pubDate>Mon, 07 Oct 2024 15:16:59 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/09484021-33e8-4d2b-9e25-f04079b46442_997x617.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7s3P!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2cb24ef-7234-4e6c-902e-081b257c3689_1000x1500.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7s3P!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2cb24ef-7234-4e6c-902e-081b257c3689_1000x1500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!7s3P!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2cb24ef-7234-4e6c-902e-081b257c3689_1000x1500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!7s3P!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2cb24ef-7234-4e6c-902e-081b257c3689_1000x1500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!7s3P!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2cb24ef-7234-4e6c-902e-081b257c3689_1000x1500.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7s3P!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2cb24ef-7234-4e6c-902e-081b257c3689_1000x1500.jpeg" width="476" height="714" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d2cb24ef-7234-4e6c-902e-081b257c3689_1000x1500.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1500,&quot;width&quot;:1000,&quot;resizeWidth&quot;:476,&quot;bytes&quot;:103832,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!7s3P!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2cb24ef-7234-4e6c-902e-081b257c3689_1000x1500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!7s3P!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2cb24ef-7234-4e6c-902e-081b257c3689_1000x1500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!7s3P!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2cb24ef-7234-4e6c-902e-081b257c3689_1000x1500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!7s3P!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2cb24ef-7234-4e6c-902e-081b257c3689_1000x1500.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>A few months back, I read this book <a href="https://www.oreilly.com/library/view/the-cybersecurity-managers/9781492076209/">The Cybersecurity Manager's Guide by Todd Barnum</a>. It provides practical insights into the challenging role of cybersecurity management. The book promised to offer insights into aligning security goals with business objectives. It was published in March 2021.</p><h2>Content Overview</h2><p>The book is divided into twelve chapters that start by addressing foundational concepts, such as the eight domains of cybersecurity. Chapter three describes the following seven steps or areas that a cybersecurity manager should focus on to drive a successful cybersecurity program:</p><ul><li><p>Step 1: Cultivate Relationships</p></li><li><p>Step 2: Ensure Alignment</p></li><li><p>Step 3: Use the Four Cornerstones to Lay the Groundwork for Your Program</p></li><li><p>Step 4: Create a Communications Plan</p></li><li><p>Step 5: Give Your Job Away</p></li><li><p>Step 6: Build Your Team</p></li><li><p>Step 7: Measure What Matters</p></li></ul><p>Chapters four to ten cover each of these focus areas in more detail. The last two chapters provide guidance on collaborating with the internal audit team to further the cybersecurity program and ideas for CISOs build trust and cultivate positive relationships throughout the organization.</p><h2>Salient Features</h2><ul><li><p>The author leverages his experience to offer actionable advice. The book is full of real-world examples and case studies from author&#8217;s own career.</p></li><li><p>It is written in an easy-to-understand language making it a valuable resource for managers transitioning into cybersecurity roles.</p></li><li><p>Rather than focusing solely on technology, the book emphasizes the importance of aligning cybersecurity strategies with overall business objectives.</p></li><li><p>This book is ideal for mid- to senior-level managers looking to enhance their understanding of cybersecurity management, as well as new cybersecurity managers seeking practical guidance.</p></li></ul><h2>Not so salient Features</h2><ul><li><p>The book does not dive into technical aspects of cybersecurity, which may leave more experienced technical professionals wanting.</p></li><li><p>While practical, the book could have benefited from a deeper dive into long-term strategic planning for cybersecurity management.</p></li></ul><h4>My rating 4.0 / 5.0</h4><p>Join our <a href="https://yks.red/discord">book club on Discord</a> and share your views on this book (<em>or any other security book of your choice</em>).</p><h2>Other book reviews</h2><ul><li><p><a href="https://www.udaymittal.com/p/book-review-practical-social-engineering">Practical Social Engineering by Joe Gray</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-ethical-hacking">Ethical Hacking by Daniel G. Graham</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-how-to-hack-like-a-ghost">How to Hack Like a GHOST by Sparc Flow</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-how-to-hack-like-a-legend">How to Hack Like a LEGEND by Sparc Flow</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-ccsp-for-dummies">CCSP for dummies by Arthur J. Deane</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-cyber-warfare-truth-tactics">Cyber Warfare &#8211; Truth, Tactics, and Strategies by Dr. Chase Cunningham</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-practical-threat-intelligence">Practical Threat Intelligence and Data-Driven Threat Hunting by Valentina Costa-Gazc&#243;n</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-hacking-api">Hacking APIs by Corey Ball</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-penetration-testing-azure">Penetration Testing Azure for Ethical Hackers by David Okeyode, Karl Fosaaen</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-pentesting-azure-applications">Pentesting Azure Applications by Matt Burrough</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-red-team-development-and-operations-by-joe-vest-and-james-tubberville/">Red Team Development and Operations by Joe Vest and James Tubberville</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-container-security-by-liz-rice/">Container Security by Liz Rice</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-web-application-security-by-andrew-hoffman/">Web Application Security by Andrew Hoffman</a></p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.udaymittal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Uday Mittal&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Book Review: Penetration Testing Azure for Ethical Hackers]]></title><description><![CDATA[Review of the book Penetration Testing Azure for Ethical Hackers by David Okeyode, Karl Fosaaen. Book published in November 2021.]]></description><link>https://www.udaymittal.com/p/book-review-penetration-testing-azure</link><guid isPermaLink="false">https://www.udaymittal.com/p/book-review-penetration-testing-azure</guid><dc:creator><![CDATA[Uday Mittal]]></dc:creator><pubDate>Sun, 06 Oct 2024 08:38:17 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/5001f75d-50aa-4b31-8b86-01dffa114a2f_899x387.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!c6CR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a80dd20-0c94-4fc3-b969-5fb7a21584e7_342x423.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!c6CR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a80dd20-0c94-4fc3-b969-5fb7a21584e7_342x423.jpeg 424w, https://substackcdn.com/image/fetch/$s_!c6CR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a80dd20-0c94-4fc3-b969-5fb7a21584e7_342x423.jpeg 848w, https://substackcdn.com/image/fetch/$s_!c6CR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a80dd20-0c94-4fc3-b969-5fb7a21584e7_342x423.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!c6CR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a80dd20-0c94-4fc3-b969-5fb7a21584e7_342x423.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!c6CR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a80dd20-0c94-4fc3-b969-5fb7a21584e7_342x423.jpeg" width="562" height="695.1052631578947" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9a80dd20-0c94-4fc3-b969-5fb7a21584e7_342x423.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:423,&quot;width&quot;:342,&quot;resizeWidth&quot;:562,&quot;bytes&quot;:19829,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!c6CR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a80dd20-0c94-4fc3-b969-5fb7a21584e7_342x423.jpeg 424w, https://substackcdn.com/image/fetch/$s_!c6CR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a80dd20-0c94-4fc3-b969-5fb7a21584e7_342x423.jpeg 848w, https://substackcdn.com/image/fetch/$s_!c6CR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a80dd20-0c94-4fc3-b969-5fb7a21584e7_342x423.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!c6CR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a80dd20-0c94-4fc3-b969-5fb7a21584e7_342x423.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I have been researching cloud security off late. Recently, the book, <a href="https://www.packtpub.com/product/penetration-testing-azure-for-ethical-hackers/9781839212932">Penetration Testing Azure for Ethical Hackers by David Okeyode , Karl Fosaaen,</a> showed up on my Twitter feed. The book had good reviews so I decided to pick it up.&nbsp; It was published in November 2021.</p><h2>Content Overview</h2><p>This book is divided in to eight chapters which can largely be categorized into four parts:</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.udaymittal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Uday Mittal&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><ul><li><p>Introduction to Azure and lab building</p></li><li><p>Enumeration and initial access to Azure resources</p></li><li><p>Exploitation of Azure resources for privilege escalation and lateral movement</p></li><li><p>Establishing persistence</p></li></ul><p>Each chapter has hands-on exercises which the reader can perform on a live Azure Subscription. The exercises can be performed using the Free Trial subscription of Azure and do not require any payment on the reader's part. The authors have provided scripts to automatically provision resources for lab scenarios for each chapter. This makes it easy to follow along the exercises. The authors have also provided clean up scripts at the end of each chapter.</p><p>In terms of tools, the book covers usage of Azure PowerShell module, Azure Active Directory PowerShell module, Azure CLI (on a Linux machine), Powerzure, Microburst etc. The book does not cover the extensive usage of these tools but it's enough to get readers started. Authors have also referenced a lot of free and useful Microsoft resources which could aid in enumerating the cloud environment.</p><p>The exploitation part of the book focuses how misconfigurations in RBAC roles (reader, contributor and owner) can be exploited to escalate privileges and move laterally within the network. The authors have also touched upon moving from Azure to on-premise and vice-versa.</p><h2>Salient Features</h2><p>Here are a few things I liked about this book:</p><ul><li><p>The hands-on exercises made it fun to go through this book.</p></li><li><p>Being new to cloud security, I learnt about various Azure and AAD misconfigurations that can prove dangerous for an organization.</p></li><li><p>The <a href="https://github.com/PacktPublishing/Penetration-Testing-Azure-for-Ethical-Hackers">companion GitHub repository</a> provides access to deployment templates and lab scripts used within the book.</p></li><li><p>Provides a good starting point for understanding and conducting Azure penetration testing.</p></li><li><p>It is good for penetration testers, red teamers, information security managers and senior executives. They can simulate real-world attacks using tactics, techniques, and procedures (TTPs) that adversaries use in cloud breaches.</p></li></ul><h2>Not so salient Features</h2><p>Here are a few things I did not like about this book:</p><ul><li><p>It does not map attacks to either <a href="https://yaksas.in/ycscblog/introduction-to-mitre-attack-framework/">MITRE ATT&amp;CK framework</a> or a <a href="https://yaksas.in/ycscblog/red-team-operations-attack-lifecycle/">Red Team Operations Attack Lifecycle</a>.</p></li></ul><h3>My rating 4.5 / 5.0</h3><p>Join our <a href="https://yks.red/discord">book club on Discord</a> and share your views on this book (<em>or any other security book of your choice</em>).</p><h2>Other book reviews</h2><ul><li><p><a href="https://www.udaymittal.com/p/book-review-practical-social-engineering">Practical Social Engineering by Joe Gray</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-ethical-hacking">Ethical Hacking by Daniel G. Graham</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-how-to-hack-like-a-ghost">How to Hack Like a GHOST by Sparc Flow</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-how-to-hack-like-a-legend">How to Hack Like a LEGEND by Sparc Flow</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-ccsp-for-dummies">CCSP for dummies by Arthur J. Deane</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-cyber-warfare-truth-tactics">Cyber Warfare &#8211; Truth, Tactics, and Strategies by Dr. Chase Cunningham</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-practical-threat-intelligence">Practical Threat Intelligence and Data-Driven Threat Hunting by Valentina Costa-Gazc&#243;n</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-hacking-api">Hacking APIs by Corey Ball</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-pentesting-azure-applications">Pentesting Azure Applications by Matt Burrough</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-red-team-development-and-operations-by-joe-vest-and-james-tubberville/">Red Team Development and Operations by Joe Vest and James Tubberville</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-container-security-by-liz-rice/">Container Security by Liz Rice</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-web-application-security-by-andrew-hoffman/">Web Application Security by Andrew Hoffman</a></p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.udaymittal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Uday Mittal&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Book Review: Pentesting Azure Applications]]></title><description><![CDATA[Review of the book Pentesting Azure Applications by Matt Burrough. Book published in July 2021.]]></description><link>https://www.udaymittal.com/p/book-review-pentesting-azure-applications</link><guid isPermaLink="false">https://www.udaymittal.com/p/book-review-pentesting-azure-applications</guid><dc:creator><![CDATA[Uday Mittal]]></dc:creator><pubDate>Sat, 14 Sep 2024 11:14:07 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/c1dd9d82-1c84-4b7b-8f3d-649059a58585_768x332.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OpJU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e46acfa-7943-4f96-bd73-2a2dad38c502_757x1000.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OpJU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e46acfa-7943-4f96-bd73-2a2dad38c502_757x1000.heic 424w, https://substackcdn.com/image/fetch/$s_!OpJU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e46acfa-7943-4f96-bd73-2a2dad38c502_757x1000.heic 848w, https://substackcdn.com/image/fetch/$s_!OpJU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e46acfa-7943-4f96-bd73-2a2dad38c502_757x1000.heic 1272w, https://substackcdn.com/image/fetch/$s_!OpJU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e46acfa-7943-4f96-bd73-2a2dad38c502_757x1000.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OpJU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e46acfa-7943-4f96-bd73-2a2dad38c502_757x1000.heic" width="498" height="657.8599735799207" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0e46acfa-7943-4f96-bd73-2a2dad38c502_757x1000.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1000,&quot;width&quot;:757,&quot;resizeWidth&quot;:498,&quot;bytes&quot;:141733,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OpJU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e46acfa-7943-4f96-bd73-2a2dad38c502_757x1000.heic 424w, https://substackcdn.com/image/fetch/$s_!OpJU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e46acfa-7943-4f96-bd73-2a2dad38c502_757x1000.heic 848w, https://substackcdn.com/image/fetch/$s_!OpJU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e46acfa-7943-4f96-bd73-2a2dad38c502_757x1000.heic 1272w, https://substackcdn.com/image/fetch/$s_!OpJU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e46acfa-7943-4f96-bd73-2a2dad38c502_757x1000.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>In continuance of my research in cloud security, I picked up another book on Azure security. The book was <a href="https://nostarch.com/azure">Pentesting Azure Applications - The Definitive Guide to Testing and Securing Deployments by Matt Burrough</a>. I got it as part of the <a href="https://www.humblebundle.com/books">Humble Book Bundle</a>.&nbsp; It was published in July 2018 and was the only book available focusing on Azure security for some time.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.udaymittal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Uday Mittal&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Content Overview</h2><p>This book is divided into eight chapters covering various services. It starts by building the importance of scoping cloud penetration testing assessments. It then provides an overview of various ways penetration testers can access an Azure environment (along with some best practices). This is followed by techniques to perform reconnaissance using Azure PowerShell module and Azure CLI. From this point onward, it provides deep dive into various Azure services using the following structure:</p><ul><li><p>Service deep-dive</p></li><li><p>Security best practices</p></li><li><p>Common misconfigurations / vulnerability points</p></li><li><p>Pentester's view of the service</p></li></ul><p>Azure services covered in this book are: Storage services (blob, files, tables and queues), VMs, App Services, Web Apps, Automation services, Network services (firewall, WAF and VPN), Authentication mechanisms (credentials, access tokens, certificates), SQL servers etc.&nbsp; The last chapter is focused on defending Azure environment and provides an overview of Azure Security Center, Operations Management Suite, Secure DevOps kit and custom log handling.</p><p>In terms of tools, the book covers usage of Azure PowerShell module, Azure CLI, Storage Explorer etc. Each chapter provides commands and scripts to enumerate Azure services. The author has also provided references to free and useful Microsoft resources to develop a better understanding of Azure.</p><h2>Salient Features</h2><p>Here are a few things I liked about this book:</p><ul><li><p>It does not assume familiarity with Azure on reader's end. The author has covered each service in sufficient detail to establish the context as to why it important from a penetration tester's perspective.</p></li><li><p>All enumeration is performed using custom developed scripts which are well-explained in the book.</p></li><li><p>The <a href="https://github.com/mburrough/pentestingazureapps">companion GitHub repository</a> provides access to enumeration scripts used within the book.</p></li><li><p>It provides security best practices and Defender's tips throughout chapters.</p></li><li><p>It is good for cloud engineers and architects, security consultants, security architects, security mangers and developers.</p></li></ul><h2>Not so salient Features</h2><ul><li><p>Surprisingly, the book misses out some of the core areas of pentester's interest such as Azure Active Directory, Azure RBAC and various access management roles.</p></li><li><p>In my opinion, the book is wrongly titled. It should have been titled as 'Practical Azure Security' or something similar.</p></li><li><p>It needs revision and a new edition. There have been a lot of changes in Azure ever since it's publication.</p></li></ul><h3>My rating 3.9 / 5.0</h3><p>Join our <a href="https://yks.red/discord">book club on Discord</a> and share your views on this book (<em>or any other security book of your choice</em>).</p><h2>Other book reviews</h2><ul><li><p><a href="https://www.udaymittal.com/p/book-review-practical-social-engineering">Practical Social Engineering by Joe Gray</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-ethical-hacking">Ethical Hacking by Daniel G. Graham</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-how-to-hack-like-a-ghost">How to Hack Like a GHOST by Sparc Flow</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-how-to-hack-like-a-legend">How to Hack Like a LEGEND by Sparc Flow</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-ccsp-for-dummies">CCSP for dummies by Arthur J. Deane</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-cyber-warfare-truth-tactics">Cyber Warfare &#8211; Truth, Tactics, and Strategies by Dr. Chase Cunningham</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-practical-threat-intelligence">Practical Threat Intelligence and Data-Driven Threat Hunting by Valentina Costa-Gazc&#243;n</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-hacking-api">Hacking APIs by Corey Ball</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-penetration-testing-azure-for-ethical-hackers/">Penetration Testing Azure for Ethical Hackers by David Okeyode, Karl Fosaaen</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-red-team-development-and-operations-by-joe-vest-and-james-tubberville/">Red Team Development and Operations by Joe Vest and James Tubberville</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-container-security-by-liz-rice/">Container Security by Liz Rice</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-web-application-security-by-andrew-hoffman/">Web Application Security by Andrew Hoffman</a></p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.udaymittal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Uday Mittal&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Book Review: Hacking API]]></title><description><![CDATA[Review of the book Hacking APIs - Breaking web application programming interfaces (API) by Corey Ball. Book published in April 2022.]]></description><link>https://www.udaymittal.com/p/book-review-hacking-api</link><guid isPermaLink="false">https://www.udaymittal.com/p/book-review-hacking-api</guid><dc:creator><![CDATA[Uday Mittal]]></dc:creator><pubDate>Fri, 13 Sep 2024 05:29:31 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/33fb251f-0b8b-4354-b0d9-a7a9d6f79df1_300x130.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!WE10!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ebd2071-9160-4353-b6d5-3a9e21822c75_474x630.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!WE10!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ebd2071-9160-4353-b6d5-3a9e21822c75_474x630.webp 424w, https://substackcdn.com/image/fetch/$s_!WE10!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ebd2071-9160-4353-b6d5-3a9e21822c75_474x630.webp 848w, https://substackcdn.com/image/fetch/$s_!WE10!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ebd2071-9160-4353-b6d5-3a9e21822c75_474x630.webp 1272w, https://substackcdn.com/image/fetch/$s_!WE10!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ebd2071-9160-4353-b6d5-3a9e21822c75_474x630.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!WE10!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ebd2071-9160-4353-b6d5-3a9e21822c75_474x630.webp" width="474" height="630" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4ebd2071-9160-4353-b6d5-3a9e21822c75_474x630.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:630,&quot;width&quot;:474,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:169404,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!WE10!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ebd2071-9160-4353-b6d5-3a9e21822c75_474x630.webp 424w, https://substackcdn.com/image/fetch/$s_!WE10!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ebd2071-9160-4353-b6d5-3a9e21822c75_474x630.webp 848w, https://substackcdn.com/image/fetch/$s_!WE10!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ebd2071-9160-4353-b6d5-3a9e21822c75_474x630.webp 1272w, https://substackcdn.com/image/fetch/$s_!WE10!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ebd2071-9160-4353-b6d5-3a9e21822c75_474x630.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>After taking some time to finish my <a href="https://elearnsecurity.com/product/ecre-certification/">eLearnSecurity Certified Reverse Engineer</a> certification, I decided to pick up another book. This time I chose API security as the topic and went for <a href="https://nostarch.com/hacking-apis">Hacking APIs: Breaking Web Application Programming Interfaces by Corey Ball</a>. It was published in April 2022 by No Starch Press.</p><h2>Content Overview</h2><p>This book is divided into four parts, covering fundamentals of web applications and APIs to real-world API hacking. It focuses on pentesting REST APIs and GraphQL APIs.&nbsp; The first few chapters provide a birds-eye view of how web applications and APIs work and most common vulnerabilities that plague APIs (aka <a href="https://owasp.org/www-project-api-security/">OWASP Top 10 API 2019</a>). If you want to dive deep into inner workings of modern web applications and REST APIs, check out these books <a href="https://nostarch.com/tangledweb">The Tangled Web by Michal Zalewski</a> and <a href="https://www.manning.com/books/the-design-of-web-apis">The Design of Web APIs by Arnaud Lauret,</a> respectively.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.udaymittal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Uday Mittal&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>The next set of chapters describe the process of setting up the lab to follow along with rest of the book. This includes setting up a Kali Linux machine, installing required tools and extensions (Burp Suite, Postman, WFuzz, Arjun, Kiterunner, Nikto, OWASP ZAP, FoxyProxy and OWASP Amass) and setting up vulnerable endpoints or web applications. The author has demonstrated most attacks on <a href="https://github.com/OWASP/crAPI">crAPI</a> and <a href="https://github.com/dolevf/Damn-Vulnerable-GraphQL-Application">Damn Vulnerable GraphQL Application (DVGA)</a>. Other vulnerable web applications mentioned in the book include, OWASP DevSlop's Pixi and OWASP Juice Shop.</p><p>In the next part (and this is where this book gets really interesting), it delves into penetration testing API endpoints from discovery, fuzzing and endpoint analysis to performing various attacks (it's really hands-on so better get your lab setup as described in earlier chapters). Each chapter in this part covers the relevant theory followed by a demonstration of the attack technique. You can easily replicate the techniques shown in your own lab.</p><p>In the last part, there is a chapter on evasion techniques (it's pretty basic but a good starting point) and&nbsp; a chapter on pentesting DVGA,&nbsp; a GraphQL based web application.</p><h2>Salient Features</h2><p>Here are a few things I liked about this book:</p><ul><li><p>The hands-on labs made it fun to go through this book.</p></li><li><p>It covers various features of BurpSuite, Postman and Wfuzz throughout chapters. I learnt a lot about Postman through this book.</p></li><li><p>The author has provided API Hacking Checklist as an additional resource.</p></li><li><p>It provides a good starting point for understanding OWASP API Top 10 and practicing various attacks.</p></li><li><p>It is good for beginners, penetration testers, red teamers and bug bounty hunters.</p></li><li><p>The author has created a <a href="https://discord.gg/22aDy6mDh9">Discord server</a> and a <a href="https://university.apisec.ai/apisec-certified-expert">free course</a> associated with this book.</p></li></ul><h2>Not so salient Features</h2><ul><li><p>It covers only the black-box approach of attacking APIs. It would have been good if the author included vulnerable code samples and explained the root cause of vulnerabilities.</p></li></ul><h3>My rating 4.5 / 5.0</h3><p>Join our <a href="https://yks.red/discord">book club on Discord</a> and share your views on this book (<em>or any other security book of your choice</em>).</p><h2>Other book reviews</h2><ul><li><p><a href="https://www.udaymittal.com/p/book-review-practical-social-engineering">Practical Social Engineering by Joe Gray</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-ethical-hacking">Ethical Hacking by Daniel G. Graham</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-how-to-hack-like-a-ghost">How to Hack Like a GHOST by Sparc Flow</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-how-to-hack-like-a-legend">How to Hack Like a LEGEND by Sparc Flow</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-ccsp-for-dummies">CCSP for dummies by Arthur J. Deane</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-cyber-warfare-truth-tactics">Cyber Warfare &#8211; Truth, Tactics, and Strategies by Dr. Chase Cunningham</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-practical-threat-intelligence">Practical Threat Intelligence and Data-Driven Threat Hunting by Valentina Costa-Gazc&#243;n</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-pentesting-azure-applications/">Pentesting Azure Applications by Matt Burrough</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-penetration-testing-azure-for-ethical-hackers/">Penetration Testing Azure for Ethical Hackers by David Okeyode, Karl Fosaaen</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-red-team-development-and-operations-by-joe-vest-and-james-tubberville/">Red Team Development and Operations by Joe Vest and James Tubberville</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-container-security-by-liz-rice/">Container Security by Liz Rice</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-web-application-security-by-andrew-hoffman/">Web Application Security by Andrew Hoffman</a></p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.udaymittal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Uday Mittal&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Switch to Hyper-V is Painful]]></title><description><![CDATA[Simple things are not simple when it comes to Hyper-V]]></description><link>https://www.udaymittal.com/p/switch-to-hyper-v-is-painful</link><guid isPermaLink="false">https://www.udaymittal.com/p/switch-to-hyper-v-is-painful</guid><dc:creator><![CDATA[Uday Mittal]]></dc:creator><pubDate>Sat, 31 Aug 2024 10:21:53 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!4-oo!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eca86ff-0051-4405-b74f-74d582ba8c15_561x561.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>You are not going to find any solutions in this post. It&#8217;s just my rant on experimenting with Hyper-V and why that failed.</p><p>I recently got a refurbished HP Mini PC and thought of installing Hyper-V instead of my usuals (VMWare Workstation or ESXi). The installation was straightforward but that was the only easy part about this.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.udaymittal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Uday Mittal&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>I wanted to setup <a href="https://remnux.org/">Remnux</a> on it, so I downloaded the Remnux OVA, <a href="https://docs.remnux.org/install-distro/get-virtual-appliance#hyper-v">converted it to Hyper-V format</a> and <a href="https://www.youtube.com/watch?v=d8uyVi0nH-U">created a VM</a> (@Cyrus, if you are reading this, please listen to people in the comments section of your video and show us how to get internet working in Remnux Hyper-V VM). The <a href="https://docs.remnux.org/install-distro/get-virtual-appliance">first thing you are advised</a> to do upon launching a Remnux VM is to upgrade it. So I ran the remnux upgrade command, only to find out that internet is not accessible via the VM (despite using Default Switch). To give you a sense of comparison, the same thing worked flawlessly on VMWare Workstation 17. I tried to troubleshoot it but lost interest since it was taking more time than I expected.</p><p>Then, I wanted to copy-paste text from host to Remnux VM but that didn&#8217;t work either. Turns out, it required Enhanced Session Mode and to <a href="https://www.nakivo.com/blog/install-ubuntu-20-04-on-hyper-v-with-enhanced-session/">enable that there a series of steps that one must follow</a>. Spend 15 mins to get something working that works out of the box in other virtualization software, nah!</p><p>Ended up removing Hyper-V and installing <a href="https://blogs.vmware.com/workstation/2024/05/vmware-workstation-pro-now-available-free-for-personal-use.html">VMWare Workstation Pro 17</a> (which is now free for personal use, by the way).</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.udaymittal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Uday Mittal&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Book Review: Practical Threat Intelligence and Data-Driven Threat Hunting]]></title><description><![CDATA[Review of the book Practical Threat Intelligence and Data-Driven Threat Hunting by Valentina Costa-Gazc&#243;n. Book published in October 2020.]]></description><link>https://www.udaymittal.com/p/book-review-practical-threat-intelligence</link><guid isPermaLink="false">https://www.udaymittal.com/p/book-review-practical-threat-intelligence</guid><dc:creator><![CDATA[Uday Mittal]]></dc:creator><pubDate>Wed, 28 Aug 2024 11:40:48 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/d67471d6-4aa7-4ce1-8695-82eaa0d64790_899x382.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2GzT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F574f9e02-a380-4e7d-8d4f-0ac8c7e14ba1_406x500.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2GzT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F574f9e02-a380-4e7d-8d4f-0ac8c7e14ba1_406x500.heic 424w, https://substackcdn.com/image/fetch/$s_!2GzT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F574f9e02-a380-4e7d-8d4f-0ac8c7e14ba1_406x500.heic 848w, https://substackcdn.com/image/fetch/$s_!2GzT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F574f9e02-a380-4e7d-8d4f-0ac8c7e14ba1_406x500.heic 1272w, https://substackcdn.com/image/fetch/$s_!2GzT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F574f9e02-a380-4e7d-8d4f-0ac8c7e14ba1_406x500.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2GzT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F574f9e02-a380-4e7d-8d4f-0ac8c7e14ba1_406x500.heic" width="606" height="746.3054187192118" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/574f9e02-a380-4e7d-8d4f-0ac8c7e14ba1_406x500.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:500,&quot;width&quot;:406,&quot;resizeWidth&quot;:606,&quot;bytes&quot;:26305,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2GzT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F574f9e02-a380-4e7d-8d4f-0ac8c7e14ba1_406x500.heic 424w, https://substackcdn.com/image/fetch/$s_!2GzT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F574f9e02-a380-4e7d-8d4f-0ac8c7e14ba1_406x500.heic 848w, https://substackcdn.com/image/fetch/$s_!2GzT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F574f9e02-a380-4e7d-8d4f-0ac8c7e14ba1_406x500.heic 1272w, https://substackcdn.com/image/fetch/$s_!2GzT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F574f9e02-a380-4e7d-8d4f-0ac8c7e14ba1_406x500.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>A part of my work involves working with Cyber Threat Intelligence (CTI) so I wanted to brush up my CTI knowledge and learn new concepts (maybe!). I picked up <a href="https://www.packtpub.com/product/practical-threat-intelligence-and-data-driven-threat-hunting/9781838556372">Practical Threat Intelligence and Data-Driven Threat Hunting by Valentina Costa-Gazc&#243;n</a> (published in October 2020 by Packt Publishing Limited). This book has been on my reading list for some time. It also allowed me to dive into a different topic.</p><h2>Content Overview</h2><p>One thing I soon realized after reading few chapters of this book was that it should have been titled, "Data-Driven Threat Hunting and Threat Intelligence".&nbsp; The author has dedicated more than 92% of the content to threat hunting and only one chapter to CTI. There is nothing wrong with this but one would expect more coverage of CTI related topics in a book that is primarily known as "Practical Threat Intelligence".</p><h3>Book Layout</h3><ul><li><p><strong>Cyber Threat Intelligence</strong> - This part covers the basics of CTI and threat hunting. It also talks about various data sources that feed a threat hunting exercise. This section also contains a primer on various computer science topics (OS, Networking, Wifi, Windows etc.).</p></li><li><p><strong>Understanding the Adversary</strong> - It is mostly focused on <a href="https://adversaryemulation.com/">Adversary Emulation</a> and covers <a href="https://attack.mitre.org/">MITRE ATT&amp;CK framework</a> in detail along with the <a href="https://mitre-attack.github.io/attack-navigator/">MITRE ATT&amp;CK Navigator tool</a>. This section also includes a case study of Formbook malware where the author maps various TTPs related to this malware to the MITRE ATT&amp;CK Framework. It then talks about creating a data model for emulating an adversary, planning and performing an adversary emulation exercise. It takes APT3 as a case study to create an adversary emulation plan.</p></li><li><p><strong>Working with a Research Environment</strong> - Covers creating a lab environment (<em>from scratch!) </em>for threat hunting in later chapters using VMWare ESXi, Ubuntu, ELK stack, HELK and Windows VMs. The author has also covered performing tests from <a href="https://github.com/redcanaryco/atomic-red-team">Atomic Red Team library</a> and using the ELK stack to detect events associated with adversarial activity. This section also covers using <a href="https://attackevals.mitre-engenuity.org/enterprise/participants/?adversaries=apt29">MTIRE ATT&amp;CK's APT29 emulation</a> to perform threat hunting in the lab environment. The author has provided a walk-through of threat hunts for various TTPs of this APT group. Finally, it discusses the importance of good documentation and automating successful hunts.</p></li><li><p><strong>Communicating to Succeed</strong> - The last part discusses how to measure and refine the quality of data collected for a threat hunt. It also talks about interpreting the results of a threat hunt, defining metrics to measure and improve the performance and effectiveness of the threat hunting team and threat hunt exercises. The last chapter discuses when to get the incident response team involved and how to effectively communicate results of threat hunting exercises to the senior management.</p></li></ul><h2>Salient Features</h2><ul><li><p>It is a good introduction to threat hunting with a good balance of theory and practical.</p></li><li><p>This book provides a holistic view of threat hunting.</p></li><li><p>The lab setup and threat hunting walk-through are well described and easy to follow.</p></li><li><p>The author has included exercises to map some of the TTPs manually.</p></li><li><p>I learnt about a lot of tools such as MITRE CALDERA, Qusar RAT, DeTT&amp;CT, The Threat Hunter Playbook, SIGMA rules, OSSEM project etc.</p></li><li><p>This book is good for security analysts, red teams, blue teams, security managers and beginners in threat hunting.</p></li></ul><h2>Not so salient Features</h2><ul><li><p>Very less coverage of Cyber Threat Intelligence.</p></li><li><p>I agree with author's philosophy of creating a lab environment from scratch but providing AWS or Azure templates to automate the lab deployment would have been nice. It would be helpful for people who are short on time.</p></li></ul><h3>My rating 4.0 / 5.0</h3><p>Join our <a href="https://yks.red/discord">book club on Discord</a> and share your views on this book (<em>or any other security book of your choice</em>).</p><h2>Other book reviews</h2><ul><li><p><a href="https://www.udaymittal.com/p/book-review-practical-social-engineering">Practical Social Engineering by Joe Gray</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-ethical-hacking">Ethical Hacking by Daniel G. Graham</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-how-to-hack-like-a-ghost">How to Hack Like a GHOST by Sparc Flow</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-how-to-hack-like-a-legend">How to Hack Like a LEGEND by Sparc Flow</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-ccsp-for-dummies">CCSP for dummies by Arthur J. Deane</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-cyber-warfare-truth-tactics">Cyber Warfare &#8211; Truth, Tactics, and Strategies by Dr. Chase Cunningham</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-hacking-api/">Hacking APIs by Corey Ball</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-pentesting-azure-applications/">Pentesting Azure Applications by Matt Burrough</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-penetration-testing-azure-for-ethical-hackers/">Penetration Testing Azure for Ethical Hackers by David Okeyode, Karl Fosaaen</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-red-team-development-and-operations-by-joe-vest-and-james-tubberville/">Red Team Development and Operations by Joe Vest and James Tubberville</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-container-security-by-liz-rice/">Container Security by Liz Rice</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-web-application-security-by-andrew-hoffman/">Web Application Security by Andrew Hoffman</a></p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.udaymittal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Uday Mittal&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Book Review: Cyber Warfare – Truth, Tactics, and Strategies]]></title><description><![CDATA[Review of the book Cyber Warfare &#8211; Truth, Tactics, and Strategies by Dr. Chase Cunningham. Book published in February 2020.]]></description><link>https://www.udaymittal.com/p/book-review-cyber-warfare-truth-tactics</link><guid isPermaLink="false">https://www.udaymittal.com/p/book-review-cyber-warfare-truth-tactics</guid><dc:creator><![CDATA[Uday Mittal]]></dc:creator><pubDate>Sun, 25 Aug 2024 10:01:34 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/99e75986-a687-4bbd-b35b-9839bd42b1a1_899x382.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Zqwg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53922a43-7001-40a6-a9c4-5ff64c116cbb_1103x1360.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Zqwg!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53922a43-7001-40a6-a9c4-5ff64c116cbb_1103x1360.heic 424w, https://substackcdn.com/image/fetch/$s_!Zqwg!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53922a43-7001-40a6-a9c4-5ff64c116cbb_1103x1360.heic 848w, https://substackcdn.com/image/fetch/$s_!Zqwg!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53922a43-7001-40a6-a9c4-5ff64c116cbb_1103x1360.heic 1272w, https://substackcdn.com/image/fetch/$s_!Zqwg!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53922a43-7001-40a6-a9c4-5ff64c116cbb_1103x1360.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Zqwg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53922a43-7001-40a6-a9c4-5ff64c116cbb_1103x1360.heic" width="614" height="757.0625566636446" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/53922a43-7001-40a6-a9c4-5ff64c116cbb_1103x1360.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1360,&quot;width&quot;:1103,&quot;resizeWidth&quot;:614,&quot;bytes&quot;:201480,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Zqwg!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53922a43-7001-40a6-a9c4-5ff64c116cbb_1103x1360.heic 424w, https://substackcdn.com/image/fetch/$s_!Zqwg!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53922a43-7001-40a6-a9c4-5ff64c116cbb_1103x1360.heic 848w, https://substackcdn.com/image/fetch/$s_!Zqwg!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53922a43-7001-40a6-a9c4-5ff64c116cbb_1103x1360.heic 1272w, https://substackcdn.com/image/fetch/$s_!Zqwg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53922a43-7001-40a6-a9c4-5ff64c116cbb_1103x1360.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>The <a href="https://www.humblebundle.com/">Humble Bundle</a> recently launched a <a href="https://www.humblebundle.com/books/cybersecurity-cyber-warfare-packt-books?hmb_source=&amp;hmb_medium=product_tile&amp;hmb_campaign=mosaic_section_1_layout_index_2_layout_type_threes_tile_index_1_c_cybersecuritycyberwarfarepackt_bookbundle">Cyber Warfare book bundle</a>. The bundle contained 24 books but <a href="https://www.packtpub.com/product/cyber-warfare-truth-tactics-and-strategies/9781839216992">Cyber Warfare &#8211; Truth, Tactics, and Strategies by Dr. Chase Cunningham</a> intrigued me so I decided to pick this book as my next read. It was published in February 2020 by <a href="https://www.packtpub.com/">Packt Publishing</a>. This is not the only book on this subject. Other books on my reading list include <a href="https://www.oreilly.com/library/view/inside-cyber-warfare/9781449318475/">Inside Cyber Warfare by Jeffrey Carr (O'Reilly)</a>, <a href="https://nostarch.com/art-cyberwarfare">The Art of Cyberwarfare by Jon DiMaggio (No Starch Press)</a> and <a href="https://nostarch.com/cyberjutsu">Cyberjutsu by Ben McCarty (No Starch Press</a>).</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.udaymittal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Uday Mittal&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Content Overview</h2><p>The book is divided into ten chapters and the author has re-enforced two messages multiple times throughout the book. First, perimeter security is dead and second, kill the password. While I don't agree with the author's view of these two security controls but I get the philosophy behind his thinking. The traditional way of looking at cybersecurity will no longer work. Organizations need to take a holistic view of their infrastructure and implement overlapping security controls for it's protection (aka defense in depth).</p><h3>Book Layout</h3><p>The book can be divided in to four sections:</p><ul><li><p><strong>Evolution of cyber warfare</strong> - This section encompasses first two chapters of the book. In these chapters, the author covers a brief history of cyber warfare and why traditional controls like perimeter security and passwords fail.</p></li><li><p><strong>Emerging attack vectors for modern cyber warfare </strong>- This section encompasses chapters three to six. I found this section to be the most interesting and informative part of the book. Here the author discusses how technologies like drones, deep fakes, artificial intelligence, machine learning, social media, mobile ransomware etc. are emerging as new attack vectors of the modern warcraft.</p></li><li><p><strong>Cyber warfare defense&nbsp; </strong>- This section encompasses chapters seven to nine. It primarily covers strategies, tools and controls to defend against cyber attacks. Here the author has also drawn a parallel between a physical war and a cyber war by using Iraq-USA war as an example. Tools mentioned by the author include Infection Monkey and SNAP_R. Controls include micro-segmentation, software-defined networks, software-defined data centers, application whitelisting and multi-factor authentication. In this section, the author also advocates user surveillance as means of intelligence collection (another view I don't agree with).</p></li><li><p><strong>Survivability and Impacts </strong>- This section encompasses chapter ten. In this section, the author states five laws to survive a cyber attack. These laws are distilled version of the content of previous chapters. At the end, the author has covered impacts (some actual, some potential) of a full-blown cyber war between nations.</p></li></ul><h2>Salient Features</h2><ul><li><p>I liked the section on emerging attack vectors for modern cyber warfare. It was thought-provoking.</p></li><li><p>I got to learn about new tools such as Infection Monkey and technologies such as heartbeat-based authentication.</p></li><li><p>It presents a multi-dimensional view of cyber warfare (technical attacks, influence attacks, misinformation attacks, deep fakes based attacks etc.).</p></li><li><p>It is good for senior executives, leaders and cyber security professionals in general.</p></li></ul><h2>Not so salient Features</h2><ul><li><p>Perimeter security is dead, kill the password and users are stupid is the resounding theme across the book.</p></li><li><p>It takes an idealistic view of implementing security controls.</p></li><li><p>Author's arguments involving technical controls needs more research.</p></li><li><p>Except for chapters three to six, I won't recommend it to readers who are technically well-versed in cybersecurity.</p></li></ul><h3>My rating 3.0 / 5.0</h3><p>Join our <a href="https://yks.red/discord">book club on Discord</a> and share your views on this book (<em>or any other security book of your choice</em>).</p><h2>Other book reviews</h2><ul><li><p><a href="https://www.udaymittal.com/p/book-review-practical-social-engineering">Practical Social Engineering by Joe Gray</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-ethical-hacking">Ethical Hacking by Daniel G. Graham</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-how-to-hack-like-a-ghost">How to Hack Like a GHOST by Sparc Flow</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-ccsp-for-dummies">CCSP for dummies by Arthur J. Deane</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-practical-threat-intelligence-and-data-driven-threat-hunting/">Practical Threat Intelligence and Data-driven threat hunting by Valentina Costa-Gazc&#243;n</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-hacking-api/">Hacking APIs by Corey Ball</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-pentesting-azure-applications/">Pentesting Azure Applications by Matt Burrough</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-penetration-testing-azure-for-ethical-hackers/">Penetration Testing Azure for Ethical Hackers by David Okeyode, Karl Fosaaen</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-red-team-development-and-operations-by-joe-vest-and-james-tubberville/">Red Team Development and Operations by Joe Vest and James Tubberville</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-container-security-by-liz-rice/">Container Security by Liz Rice</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-web-application-security-by-andrew-hoffman/">Web Application Security by Andrew Hoffman</a></p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.udaymittal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Uday Mittal&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Are you the Person of Interest?]]></title><description><![CDATA[Person of Interest is a thriller Sci-Fi television show depicting advanced mass surveillance.]]></description><link>https://www.udaymittal.com/p/are-you-the-person-of-interest</link><guid isPermaLink="false">https://www.udaymittal.com/p/are-you-the-person-of-interest</guid><dc:creator><![CDATA[Uday Mittal]]></dc:creator><pubDate>Thu, 22 Aug 2024 16:31:07 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/1bca8db1-7115-4756-b959-0960d56c1d60_1024x576.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Imagine the Big Brother from <a href="http://www.goodreads.com/book/show/5470.1984">George Orwell's 1984</a>, only in stealth mode. A system so sophisticated that nothing hides from it. It's eyes and ears are everywhere. It knows where you are, why you're there, who you are meeting with and what you are talking about. It watches you every minute of every day. Yet you walk as if everything is normal. Would you want to live in that world where those in power can crush you like an ant, should you become an inconvenience to them.</p><p>Designed by <a href="http://personofinterest.wikia.com/wiki/Harold_Finch">Harold Finch</a>&nbsp;(played by <a href="http://en.wikipedia.org/wiki/Michael_Emerson">Micheal Emerson</a>) an average employee by the day and a genius computer scientist by the night. He built the Machine to watch acts of terror and alert the authorities beforehand. But it sees everything even acts of small crime. Based on it's observations, it churns out social security numbers of either victims or perpetrators. The Machine was originally developed for government use, however, seeing it's potential misuse if placed in wrong hands, Finch hid it and turned into a vigilante. With the help of the Machine, Finch and his team <a href="http://personofinterest.wikia.com/wiki/John_Reese">John Reese</a>&nbsp;(played by <a href="http://personofinterest.wikia.com/wiki/Jim_Caviezel">Jim Cviezel</a>), <a href="http://personofinterest.wikia.com/wiki/Sameen_Shaw">Sameen Shaw</a>&nbsp;(played by <a href="https://en.wikipedia.org/wiki/Sarah_Shahi">Sarah Shahi</a>), <a href="http://personofinterest.wikia.com/wiki/Root">Root</a>&nbsp;(played by <a href="http://personofinterest.wikia.com/wiki/Amy_Acker">Amy Acker</a>) and <a href="http://personofinterest.wikia.com/wiki/Lionel_Fusco">Detective Lionel Fusco</a>&nbsp;(played by <a href="http://personofinterest.wikia.com/wiki/Kevin_Chapman">Kevin Chapman</a>) have took it upon themselves to protect/incriminate the <a href="https://en.wikipedia.org/wiki/Person_of_Interest_(TV_series)">Person of Interest</a>&nbsp;and prevent the Machine from falling into the wrong hands.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.udaymittal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Uday Mittal&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>It's hard to come by a TV show like this. The show has got an <a href="http://www.imdb.com/title/tt1839578/">Imdb rating of 8.5</a>&nbsp;and has won People's Choice Award (2012) in the category of Favorite New Drama. It is a must watch for those of you who crave good entertainment in the field of computers. The story line is gripping and the added benefit is that the viewers get to learn something new about computer science and information technology in nearly every episode.</p><p>You can purchase seasons 1-5 from following links:</p><ul><li><p><a href="https://www.amazon.com/gp/video/detail/B0095R3M72/ref=atv_dp_season_select_s1">Person of Interest Season 1</a></p></li><li><p><a href="https://www.amazon.com/gp/video/detail/B00DARC814/ref=atv_dp_season_select_s2">Person of Interest Season 2</a></p></li><li><p><a href="https://www.amazon.com/gp/video/detail/B00F3KFFPM/ref=atv_dp_season_select_s3">Person of Interest Season 3</a></p></li><li><p><a href="https://www.amazon.com/gp/video/detail/B00NVBJD6M/ref=atv_dp_season_select_s4">Person of Interest Season 4</a></p></li><li><p><a href="https://www.amazon.com/gp/video/detail/B01F4L45XW/ref=atv_dp_season_select_s5">Person of Interest Season 5</a></p></li></ul><p>Image Credits: <a href="http://img08.deviantart.net/7595/i/2012/101/5/c/person_of_interest_by_entangle-d4r5eyo.jpg">Deviantart.com</a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.udaymittal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Uday Mittal&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Book Review: How to Hack Like a LEGEND]]></title><description><![CDATA[Review of the book How to Hack Like a LEGEND by Sparc Flow. First published in 2018 and a newer edition in October 2022.]]></description><link>https://www.udaymittal.com/p/book-review-how-to-hack-like-a-legend</link><guid isPermaLink="false">https://www.udaymittal.com/p/book-review-how-to-hack-like-a-legend</guid><dc:creator><![CDATA[Uday Mittal]]></dc:creator><pubDate>Wed, 21 Aug 2024 16:14:08 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/1097ae01-bf6d-45c5-921a-b4848d4e4dad_899x382.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mITU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b6a65e3-5cda-48a0-bdaa-86bec02cc019_380x500.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mITU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b6a65e3-5cda-48a0-bdaa-86bec02cc019_380x500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!mITU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b6a65e3-5cda-48a0-bdaa-86bec02cc019_380x500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!mITU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b6a65e3-5cda-48a0-bdaa-86bec02cc019_380x500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!mITU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b6a65e3-5cda-48a0-bdaa-86bec02cc019_380x500.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mITU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b6a65e3-5cda-48a0-bdaa-86bec02cc019_380x500.jpeg" width="728" height="957.8947368421053" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1b6a65e3-5cda-48a0-bdaa-86bec02cc019_380x500.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:500,&quot;width&quot;:380,&quot;resizeWidth&quot;:728,&quot;bytes&quot;:30794,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mITU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b6a65e3-5cda-48a0-bdaa-86bec02cc019_380x500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!mITU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b6a65e3-5cda-48a0-bdaa-86bec02cc019_380x500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!mITU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b6a65e3-5cda-48a0-bdaa-86bec02cc019_380x500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!mITU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b6a65e3-5cda-48a0-bdaa-86bec02cc019_380x500.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>After completing the <a href="https://www.isc2.org/Certifications/CCSP">CCSP certification</a>, I decided to switch gears and pick-up a book focusing on red teaming or <a href="https://yaksas.in/ycscblog/what-is-adversary-emulation/">adversary emulation</a>. I chose <a href="https://nostarch.com/how-hack-legend">How to Hack Like a LEGEND by Sparc Flow</a>. This book is part of the series, <a href="https://www.sparcflow.com/best-hacking-books/">Hack The Planet</a>. The first edition of this book was independently published by the author in 2018. However, a newer edition of this book is expected to be released in October 2022 by No Starch Press. The Early Access version of the new edition is available <a href="https://nostarch.com/how-hack-legend">here</a>.</p><h2>Content Overview</h2><p>"<em>This is not your typical tech book.</em>" as the author describes it. I agree, it reads like a novel. This book narrates the story of a hacker who wants to unearth the shady dealings of an offshore accounting firm, G&amp;S Trust (this is the same approach that I have taken in my course <a href="https://adversaryemulation.com">Red Team Adversary Emulation</a> where we set out to breach into a Fin Tech firm, <a href="https://taxfirstlabz.xyz">Tax First Labz</a>). In the book, the hacker sets out to identify an exploitable vulnerability in the G&amp;S Trust network but to no avail. This forces him to look at the supply chain angle. So he sets out to breach a company in the supply chain of G&amp;S Trust and soon finds an attractive target. What happens next? You will need to read the book to find out.</p><h3>Book Layout</h3><p>The book is divided into four parts:</p><ul><li><p><strong>Starting Blocks </strong>- This section encompasses first four chapters. In these chapters, the hacker sets up his hacking infra, performs recon, identifies a weak link in the supply chain and sets up a phishing campaign to collect credentials from the target supply chain company.</p></li><li><p><strong>First Dive In</strong> - This section encompasses chapters five to seven. In these chapters, the hacker uses the collected credentials to break-in and realizes that his actions are being watched. He then goes on to identify the security tools in action and possible ways to defeat them.</p></li><li><p><strong>Back to the Arena</strong> - This section encompasses chapters eight to twelve. In these chapters, the hacker delves into a few OPSEC techniques to defeat security monitoring tools, creates custom payloads and demonstrates installing a backdoor in the source code of the software used by G&amp;S Trust.</p></li><li><p><strong>Salvation</strong> - This section encompasses chapters thirteen to fourteen. In these chapters, the hacker finally gains access to G&amp;S Trust, breaks into various machines to collect data and finally gets his hands on the evidence he was looking for.</p></li></ul><h2>Salient Features</h2><ul><li><p>This book demonstrates a real-life supply chain attack. This helped me in understanding the true mechanics of a supply chain attack.</p></li><li><p>The author has given due importance to OPSEC techniques (which is not found in many of the "hacking" books out there).</p></li><li><p>Though it doesn't explicitly cover topics such as red reaming or adversary emulation, it demonstrates them practically.</p></li><li><p>It is a good resource for OSCP, OSEP, CRTP, CRTE and CRTO aspirants.</p></li><li><p>It is good for beginners, penetration testers, red teams and blue teams.</p></li><li><p>If you are curious about how real-world breaches happen, go for this book.</p></li></ul><h2>Not so salient Features</h2><ul><li><p>A mapping of the hacker's TTPs to the <a href="https://yaksas.in/ycscblog/introduction-to-mitre-attack-framework/">MITRE ATT&amp;CK</a> Framework would have been nice (this is more of a suggestion to the author for the next edition of this book).</p></li><li><p>I would have loved a <a href="https://adversaryemulation.com/rtae-lab-taxfirstlabz">self-hosted hands-on lab</a> to practice the techniques demonstrated in the book.</p></li></ul><h3>My rating 4.5 / 5.0</h3><p>Join our <a href="https://yks.red/discord">book club on Discord</a> and share your views on this book (<em>or any other security book of your choice</em>).</p><h2>Other book reviews</h2><ul><li><p><a href="https://www.udaymittal.com/p/book-review-practical-social-engineering">Practical Social Engineering by Joe Gray</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-ethical-hacking">Ethical Hacking by Daniel G. Graham</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-how-to-hack-like-a-ghost">How to Hack Like a GHOST by Sparc Flow</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-ccsp-for-dummies">CCSP for dummies by Arthur J. Deane</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-cyber-warfare-truth-tactics-and-strategies/">Cyber Warfare &#8211; Truth, Tactics, and Strategies by Dr. Chase Cunningham</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-practical-threat-intelligence-and-data-driven-threat-hunting/">Practical Threat Intelligence and Data-driven threat hunting by Valentina Costa-Gazc&#243;n</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-hacking-api/">Hacking APIs by Corey Ball</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-pentesting-azure-applications/">Pentesting Azure Applications by Matt Burrough</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-penetration-testing-azure-for-ethical-hackers/">Penetration Testing Azure for Ethical Hackers by David Okeyode, Karl Fosaaen</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-red-team-development-and-operations-by-joe-vest-and-james-tubberville/">Red Team Development and Operations by Joe Vest and James Tubberville</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-container-security-by-liz-rice/">Container Security by Liz Rice</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-web-application-security-by-andrew-hoffman/">Web Application Security by Andrew Hoffman</a></p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.udaymittal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Uday Mittal&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Book Review: Ethical Hacking]]></title><description><![CDATA[Review of the book Ethical Hacking by Daniel G. Graham. First published in October 2021 by No Starch Press]]></description><link>https://www.udaymittal.com/p/book-review-ethical-hacking</link><guid isPermaLink="false">https://www.udaymittal.com/p/book-review-ethical-hacking</guid><dc:creator><![CDATA[Uday Mittal]]></dc:creator><pubDate>Sun, 18 Aug 2024 14:27:45 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/fce71458-ef2f-47af-8efe-10c851ebd153_899x382.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!EjA7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb049fca-e36e-4e5c-accd-bb4c910d9edb_376x500.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!EjA7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb049fca-e36e-4e5c-accd-bb4c910d9edb_376x500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!EjA7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb049fca-e36e-4e5c-accd-bb4c910d9edb_376x500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!EjA7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb049fca-e36e-4e5c-accd-bb4c910d9edb_376x500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!EjA7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb049fca-e36e-4e5c-accd-bb4c910d9edb_376x500.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!EjA7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb049fca-e36e-4e5c-accd-bb4c910d9edb_376x500.jpeg" width="376" height="500" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cb049fca-e36e-4e5c-accd-bb4c910d9edb_376x500.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:500,&quot;width&quot;:376,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:66232,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!EjA7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb049fca-e36e-4e5c-accd-bb4c910d9edb_376x500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!EjA7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb049fca-e36e-4e5c-accd-bb4c910d9edb_376x500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!EjA7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb049fca-e36e-4e5c-accd-bb4c910d9edb_376x500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!EjA7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb049fca-e36e-4e5c-accd-bb4c910d9edb_376x500.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>It's been some time since I posted <a href="https://yaksas.in/ycscblog/book-review-how-to-hack-like-a-legend/">my last review</a>, so here comes the next one. This one is for the book <a href="https://nostarch.com/ethical-hacking">Ethical Hacking by Daniel G. Graham</a>. It's been a couple of months since I finished this book. That's the time it takes (<em>at least for me</em>) to truly absorb all the information presented in this book. It was published in October 2021 by No Starch Press. I got it as part of No Starch Press <a href="https://www.humblebundle.com/books">Humble Bundle</a>.</p><h2>Content Overview</h2><p>This book is divided into five + 1 parts, covering network fundamentals, cryptography basics and attacks, social engineering techniques, exploitation and post-exploitation attacks. Before diving into concepts, the author has dedicated a chapter to setup a basic lab to enable readers to try out various techniques demonstrated in this book. Throughout the book the author has listed challenging exercises for readers to build upon the concepts learnt through this book.</p><h3>Book Layout</h3><p>The book is divided into five + 1 parts:</p><ul><li><p><strong>Setting Up </strong>- This chapter covers setting up a basic lab that will be used throughout the book to demonstrate various attacks. The lab mostly uses open-source technologies like Virtual Box, Metasploitable (as the victim machine), pfSense and Ubuntu.</p></li><li><p><strong>Network Fundamentals </strong>- This section encompasses chapters two to four. It covers basics of MAC addresses, IP addresses, ARP tables etc. It demonstrates how to perform and detect an ARP spoofing attack. It then covers basics of network layers, packet structures and explains how to capture and analyze network traffic using WireShark. It closes by teaching how to create custom TCP shells.</p></li><li><p><strong>Cryptography </strong>- This section encompasses chapters five and six. It describes certain cryptography algorithms in detail (including the math behind them). It also explains how Diffie-Hellman, ECC algorithms work. Throughout this section there is an extensive usage of openssl to generate various keys.</p></li><li><p><strong>Social Engineering </strong>- This section encompasses chapters seven and eight. It covers how to craft a phishing campaign (email, domain names, website etc.). It also demonstrates how modern technologies such as DeepFake videos and machine learning models can be used for phishing. It then delves into information gathering about the target organization using various Open Source Intelligence (OSINT) tools and techniques. Tools covered in this section include, Maltego, Masscan, Shodan, Google Dorks etc.</p></li><li><p><strong>Exploitation</strong> - This section encompasses chapters nine to thirteen. It demonstrates how to write exploits from scratch and uses <a href="https://heartbleed.com/">Heartbleed vulnerability</a> as an example. It then discusses the theory of fuzzing and how to perform fuzzing using tools and techniques such as AFL, Symbolic Execution, Dynamic Symbolic Execution, Angr and Spike. It then explains how to build Linux and Android Trojans using metasploit. It also covers how to be OPSEC (operation security) safe by adding anti-virus evasion techniques or embedding a rootkit into the Linux kernel. Next, it covers exploiting common web application vulnerabilities and cracking passwords.</p></li><li><p><strong>Controlling The Network</strong> - This section encompasses chapters fourteen to sixteen. It covers post exploitation tactics such as privilege escalation, lateral movement and attacking Active Directory infrastructure (pass-the-ticket, DCSync, Golden ticket attacks).</p></li></ul><h2>Salient Features</h2><ul><li><p>It focuses on building custom tools (TCP shells, Trojans, Rootkits etc.) which helps in understanding how they work behind the scenes.</p></li><li><p>It was interesting to learn some novel techniques like back-dooring a .deb package, phishing using DeepFake technology etc.</p></li><li><p>It covers modern technologies such as ECC, DeepFake etc.</p></li><li><p>In some ways it can be considered as the <em>much-awaited</em> updated version of <a href="https://nostarch.com/pentesting">Georgia Weidman's Penetration Testing book by No Starch Press</a>.</p></li><li><p>It is good for beginners in cybersecurity, ethical hacking and offensive security.</p></li><li><p>The author has created a <a href="https://discord.gg/E4UMsgxCbC">Discord server</a> associated with this book.</p></li></ul><h2>Not so salient Features</h2><ul><li><p>A cloud-based template of the lab would have been nice.</p></li><li><p>It goes into a little more depth of certain topics than required.</p></li><li><p>I would have loved a <a href="https://adversaryemulation.com/rtae-lab-taxfirstlabz">self-hosted hands-on lab</a> to practice the techniques demonstrated in the book.</p></li></ul><h3>My rating 4.5 / 5.0</h3><p>Join our <a href="https://yks.red/discord">book club on Discord</a> and share your views on this book (<em>or any other security book of your choice</em>).</p><h2>Other book reviews</h2><ul><li><p><a href="https://www.udaymittal.com/p/book-review-practical-social-engineering">Practical Social Engineering by Joe Gray</a></p></li><li><p><a href="https://www.udaymittal.com/p/book-review-how-to-hack-like-a-ghost">How to Hack Like a GHOST by Sparc Flow</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-how-to-hack-like-a-legend/">How to Hack Like a LEGEND by Sparc Flow</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-ccsp-for-dummies">CCSP for dummies by Arthur J. Deane</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-cyber-warfare-truth-tactics-and-strategies/">Cyber Warfare &#8211; Truth, Tactics, and Strategies by Dr. Chase Cunningham</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-practical-threat-intelligence-and-data-driven-threat-hunting/">Practical Threat Intelligence and Data-driven threat hunting by Valentina Costa-Gazc&#243;n</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-hacking-api/">Hacking APIs by Corey Ball</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-pentesting-azure-applications/">Pentesting Azure Applications by Matt Burrough</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-penetration-testing-azure-for-ethical-hackers/">Penetration Testing Azure for Ethical Hackers by David Okeyode, Karl Fosaaen</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-red-team-development-and-operations-by-joe-vest-and-james-tubberville/">Red Team Development and Operations by Joe Vest and James Tubberville</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-container-security-by-liz-rice/">Container Security by Liz Rice</a></p></li><li><p><a href="https://yaksas.in/ycscblog/book-review-web-application-security-by-andrew-hoffman/">Web Application Security by Andrew Hoffman</a></p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.udaymittal.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Uday Mittal&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>