Sunday, May 24, 2020

What I'm Reading (or Watching) 5/24/2020 - Basically a bunch of Tanium stuff and a Judd Nelson classic from 1984

Books -

On the Internet, every action leaves a mark–in routers, firewalls, web proxies, and within network traffic itself. When a hacker breaks into a bank, or an insider smuggles secrets to a competitor, evidence of the crime is always left behind.

 Learn to recognize hackers’ tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace. Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyze a real-world wireless encryption-cracking attack (and then crack the key yourself). Reconstruct a suspect’s web surfing history–and cached web pages, too–from a web proxy. Uncover DNS-tunneled traffic. Dissect the Operation Aurora exploit, caught on the wire.

 Throughout the text, step-by-step case studies guide you through the analysis of network-based evidence. You can download the evidence files from the authors’ web site (lmgsecurity.com), and follow along to gain hands-on experience.

Yes, this is the same one I was working on before, I stalled out then, but yesterday I picked it up again and cranked out a chapter so I am back in the saddle again.   

Blogs / News - 

Figuring out how to diagram a network for the first time was a bit overwhelming, but what helped was to understand the borders and components of the external (public), demilitarized zone (segmented), and internal (private) areas of the network. Afterwards, I made a list of what I would include in the diagram and carefully sketched out the rough idea.
...
I then asked myself, “how would I secure this network to prevent sensitive information from being stolen?” I reviewed common attacks, threats, and vulnerabilities and came up with scenarios I could attempt to mitigate.

Further decoupling

Over the years, American investors have been pumping billions of dollars into Chinese firms listed in the U.S., from giants like Alibaba and Baidu to emerging players like Pinduoduo and Bilibili. That could change soon with the Holding Foreign Companies Accountable Act, a new bill passed this week with bipartisan support to tighten accounting standards on foreign companies, with the obvious target being China.

“For too long, Chinese companies have disregarded U.S. reporting standards, misleading our investors. Publicly listed companies should all be held to the same standards, and this bill makes commonsense changes to level the playing field and give investors the transparency they need to make informed decisions,” said Senator Chris Van Hollen who introduced the legislation.

A new tool by hacking group Unc0ver can jailbreak iOS 13.5, the just-released version of Apple’s mobile operating system, Wired reported. The group says the jailbreak, which works on iOS 11 and higher, is built on a zero-day vulnerability, doesn’t drain a device’s battery life, and doesn’t affect the use of Apple services or undermine the iOS sandbox security, according to Wired
Other -


Playlist of videos on Basic Tanium Network Management functions.

This weeks movie - Judd Nelson's greatest role Eddie Keaton in 1984's "Making the Grade"


full movie available on youtube


No comments: