Tuesday, October 3, 2017

SOC Analysts : Recommended Security Tool Bookmarks

Many sources are available for the SOC analyst to learn about various threats. Each SOC maintains similar threat intelligence lists that are tailored to its individual preferences, and the lists are modified as sites become more or less relevant or as new sites are created.

Monday, August 21, 2017

Common HTTP Status Codes (RFC 2616)


Some of the common HTTP Status codes taken from RFC 2616 which can help penetration testers / cybersecurity analysts / IT Admins are below :



Transaction/Error Status Description
Successful Transactions 200 OK
Successful Transactions 201 Created
Successful Transactions 202 Accepted
Redirected Transactions 301 Moved Permanently
Redirected Transactions 302 Moved Temporarily
Redirected Transactions 304 Not Modified
Client Side Errors 400 Bad Request
Client Side Errors 401 Unauthorised
Client Side Errors 403 Forbidden
Client Side Errors 404 Not Found
Server Side Errors 500 Internal Server Error
Server Side Errors 501 Not Implemented
Server Side Errors 502 Bad Gateway
Server Side Errors 503 Service Unavailable






Sunday, August 20, 2017

Encoded Characters Map to Standard Characters



  •     %3c = <
  •     %20 = (a space character)
  •     %22 = “
  •     %3a = :
  •     %27 = ‘
  •     %2e = .
  •     %2f = /
  •     %3e = >
  •     %5c = \

Sunday, July 16, 2017

Cyber Security - In Reality

Recently I came to know about an incident which forced me to draft my thoughts here on my blog about Attack Surfaces and Attack Vectors. This will also talk about some preventive measures which are basics and should be taken care in the organisation. That said, we should also understand that if someone tells us that his tool/ or he can make our organisations security posture unbreakable and hack proof, please ignore them to start with. Our focus should always be to perform internal assessments and to apply best practices as much as possible to reduce the attack vectors and surfaces, and to have processes to deal with such security incidents. There will always be a new way which the hackers will work out to penetrate the network.

The IT space currently has been under pressure due to cyber attacks and viruses / malware being released leading to huge losses and creating a panic specially for the IT support teams as they were not ready for it. We all should accept that this is now a new normal and instead of pushing the panic button we need to change our strategy and get the people with the right skills to do the job.

I think it was John Chambers who said that "There are two types of companies: those that have been hacked, and those who don't know they have been hacked." and actually I feel that is very true.

I personally am of an opinion that no tool can solve all your issues, you should put the right people on the job, do extensive analysis, change your current processes and ways of work. Tools come in the end. 

Attack Surface 

It is the sum of the different points, the attack vectors, in a given computing device or network that are accessible to an unauthorised user which is called the "Attacker"

  • Classification of Attack Surface

    • Network
      • Open Ports
      • Insecure Protocols
      • Low Bandwidths
      • Multiple users for administrative accounts
    • Software
      • Improper Coding
      • Privacy Settings
      • Opensource Apps without support for patch and releases
    • Physical
      • Internal Employees
      • Rouge Devices
      • Social Engineering
      • Passwords on notebooks / sticky notes / etc
      • Phishing Emails

  • Reducing Attack Surfaces
    • As I mentioned above, attacks are unstoppable
    • We should be focussing on the high risk areas first
    • We will have to deploy advanced techniques and technologies against emerging threats
    • We should perform an internal analysis of the attack surface
    • We should perform an internal vulnerability assessment on the system and software
    • Formulate an security incident response process
    • We should consider deploying Security Incident Management tools e.g. SIEM

  • Areas to Focus
    • Hide vulnerable ports
    • To implement a technique to perform a realtime monitoring of data flows over the network
    • Design and Develop of network infrastructure with recommended security features. Follow security by design.
    • Promptly respond to changes realtime
    • Uninstall / Remove all the unused applications / services from servers
    • Limit the number of users and applications for both performance and security reasons
    • Enforce policies and procedures to everyone in the organisation
    • Cut down on unnecessary requests (emails, database access)
    • Use load balancers, advance firewalls, VLAN's, honeypots to divert the attacker from high value areas

Attack Vectors 

Methods by which a hacker exploits the systems, network and software based on possible attack surfaces. The most common attack vectors are : Viruses, emails, spam, ads and spyware.

  • Classification of Attack Vectors
    • Low Risk - Low threat to the the business / IT environment
    • Medium Risk - Threat with a mitigation workaround available
    • High Risk - Imminent threat to the business / IT environment
  • Examples of Attack Vectors
    • SQL Injection
    • DDoS Attacks
    • Phishing
    • Eaves Dropping
    • Malware Injection
           (I assume that you are aware of the techniques which are specified in the examples above)

  • Preventive Measures
    • Update all the systems / devices with the latest patches
    • Updated Antivirus
    • Deploy Advanced Firewall protection and endpoint security
    • Deploy Honeypots
    • Deploy Load Balancers
    • Enforce appropriate security policies
    • Provide education to the users of the environment
    • Deploy Security Incident Management tools e.g. SIEM

Now with EU GDPR in the mix, it will be even more interesting to see the response by the IT Teams. My advise, don't panic just start working step by step on the points mentioned above and you should be there. Experience in IT and awareness about Cyber Security and Data Protection is all what it  should take.

If anyone is looking for any help you can reach me on : catchme@ashuarunsethi.in, I love to work on new challenges in my free time. 


The Azure Synapse Resource Provider Error

  If you are get the error " The Azure Synapse resource provider (Microsoft.Synapse) needs to be registered with the selected subscript...