<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: ℙ𝕣𝕚𝕞𝕚𝕕𝕒𝕔 ℂ𝕠𝕕𝕖𝕤</title>
    <description>The latest articles on Forem by ℙ𝕣𝕚𝕞𝕚𝕕𝕒𝕔 ℂ𝕠𝕕𝕖𝕤 (@primidac).</description>
    <link>https://forem.com/primidac</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F273826%2F5f51169a-00db-449b-adf2-8bea362af7bf.jpg</url>
      <title>Forem: ℙ𝕣𝕚𝕞𝕚𝕕𝕒𝕔 ℂ𝕠𝕕𝕖𝕤</title>
      <link>https://forem.com/primidac</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/primidac"/>
    <language>en</language>
    <item>
      <title>The Art Of User Enumeration</title>
      <dc:creator>ℙ𝕣𝕚𝕞𝕚𝕕𝕒𝕔 ℂ𝕠𝕕𝕖𝕤</dc:creator>
      <pubDate>Mon, 02 Nov 2020 10:07:44 +0000</pubDate>
      <link>https://forem.com/primidac/the-art-of-user-enumeration-4a46</link>
      <guid>https://forem.com/primidac/the-art-of-user-enumeration-4a46</guid>
      <description>&lt;p&gt;Ok! Yet another big term &lt;strong&gt;User Enumeration&lt;/strong&gt; and you might be asking yourself, what the heck is user enumeration anyways. Well you're in luck because I'm here to tell you all about &lt;strong&gt;User Enumeration&lt;/strong&gt; and how to prevent it.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;What is user Enumeration&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;First thing first, you should know that User Enumeration is a Cyber Security term and now that you know that, the big question now is &lt;em&gt;What is user enumeration?&lt;/em&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;User enumeration is a malicious act of using special hacking techniques to guess or confirm valid users in a system server.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Special hacking techniques often used for user enumeration is &lt;strong&gt;bruteforce&lt;/strong&gt; which enables the hacker to obtain some sensitive information to know the validity of a user on a particular system.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;According to Wikipedia, In cryptography, a brute-force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;User enumeration is a vulnerability that is often found on websites and one of the places where it's usually present is a website login and forgot password functionality.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;How it works&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;The key to user enumeration is to know the validity of a user on a particular system. So the hacker looks for differences in server response based on the details given by him to the server.&lt;/p&gt;

&lt;p&gt;For example, when we try to login into a website and we input a user name and a password and the server returns with "user does not exist", this would tell the hacker that what's wrong here is the "user's name" and not the password and by giving such information to the hacker, he/she can now plan the next phase of attack. This also applies to when he puts a correct user but invalid password. This techniques also applies to the "forgotten password" functionality of a website, when a hacker input a username,email, or phone number in the forgotten password field and the server responds with a "does not exist", this would tell the hacker on how plan its next phase of attack. Usually the hacker uses some kind of advanced &lt;strong&gt;bruteforcing&lt;/strong&gt; attack to gain access to the user's account.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Ways to Prevent User Enumeration Attack&lt;/strong&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Send a generic message to the user - Instead of telling the user what's wrong with the field like saying "Invalid username" or saying "Invalid password", send a generic message like "Invalid username or password"&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Make your server response time same for all request - Ok you might be thinking how server response time would hint the hacker that a field is correct or not well hackers are intelligent and I would tell you how server response time hint the hacker. When a server respond faster for a valid input and take a long while for an invalid input and vice versa, this hint the hacker on which input is correct or not so to fix this you have to give your server a hard coded time the server returns it response to the user, that way both invalid and valid requests both have the same response time and by so doing the hacker doesn't get any hint.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Using a Web Application Firewall (WAF) - Let's say the hacker wants to perform a &lt;strong&gt;bruteforce&lt;/strong&gt; attack on a user and starts trying a list of random username at a sequence, the firewall will block the hacker's IP because a normal user cannot input a username at such sequence.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Use 2 Factor Authentication - Using 2FA makes the end goal of the hacker fruitless so it's advised to use 2FA.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;As a general rule it's advised to always cross check your server response for any sort of vulnerabilities.&lt;/p&gt;

&lt;p&gt;Peace ✌🏼✌🏼✌🏼&lt;/p&gt;

&lt;p&gt;&lt;a href="https://primidac.tech"&gt;Primidac&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>backend</category>
      <category>hacking</category>
    </item>
    <item>
      <title>What is Cyber Security</title>
      <dc:creator>ℙ𝕣𝕚𝕞𝕚𝕕𝕒𝕔 ℂ𝕠𝕕𝕖𝕤</dc:creator>
      <pubDate>Mon, 05 Oct 2020 09:23:10 +0000</pubDate>
      <link>https://forem.com/primidac/what-is-cyber-security-g3f</link>
      <guid>https://forem.com/primidac/what-is-cyber-security-g3f</guid>
      <description>&lt;p&gt;Okay, Cyber Security!!!. A lot of us have heard the word Cyber Security and I'm pretty sure only few know what it really means and what it entails. Many people refer to Cyber Security as hacking but that is not the case. Let's get down to what is Cyber Security, what it entails and how to get started.&lt;/p&gt;

&lt;h1&gt;
  
  
  &lt;strong&gt;What is Cyber Security&lt;/strong&gt;
&lt;/h1&gt;

&lt;p&gt;Cyber Security refers to the act of defending networks, devices, data and software from malicious attacks, damages or unauthorized access. Most people confuse Information Security and Cyber Security.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;Information Security is the process of securing information data from unauthorized access or leak regardless  of being digital or analogue, while Cyber Security on the other hand is the protection of data, software and servers in the Cyberspace. Cyber there referring to thing connected to the internet&lt;/em&gt; &lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Please note that Cyber Security is a body meaning that it contains different components.&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Types Of Cyber Security
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Application Security&lt;/li&gt;
&lt;li&gt;Network Security&lt;/li&gt;
&lt;li&gt;Critical Infrastructure Security&lt;/li&gt;
&lt;li&gt;Cloud Security&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Listed above are the types of Cyber Security we have each having a broad field of implementation. &lt;/p&gt;

&lt;h2&gt;
  
  
  Fields in Cyber Security
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Security Analyst&lt;/li&gt;
&lt;li&gt;Security Architect&lt;/li&gt;
&lt;li&gt;Security Administrator &lt;/li&gt;
&lt;li&gt;Security Software Developer&lt;/li&gt;
&lt;li&gt;Cryptographer&lt;/li&gt;
&lt;li&gt;Cryptanalyst&lt;/li&gt;
&lt;li&gt;Security Consultant&lt;/li&gt;
&lt;li&gt;Pentester&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Getting Started with Cyber Security
&lt;/h2&gt;

&lt;p&gt;Cyber Security is a very nice field to go into and with huge demand in the market also with a very good pay. The more things are becoming digital the more the demand for Cyber Security, but with such broad field in Cyber Security, how would one get started?. Well i laid down some steps [Not professional but is sure to work for anyone that follows it. 😅 worked for me though.]&lt;/p&gt;

&lt;h2&gt;
  
  
  Steps in Getting Started with Cyber Security
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Note that these steps are from the ground up and the good news is they work provided you are dedicated, hardworking  and have lots of study time 😅.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Step 1 - Getting to know Cyber Security by reading more of my article😅.&lt;/li&gt;
&lt;li&gt;Step 2 - Pick up a field of Choice. [This would make you more focused in your journey.&lt;/li&gt;
&lt;li&gt;Step 3 - Learn a Programming Language, 
&lt;em&gt;I know programming is not a must in most areas of Cyber Security but knowing it is a huge bonus to you in the field of Cyber Security&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;Participate in Hackathons, this would help you network and solve real world problems&lt;/li&gt;
&lt;li&gt;Begin a Project related to your chosen field&lt;/li&gt;
&lt;li&gt;Enroll in a course - Well this works very well but [yes there is a but], you have to up your game and work really hard if not you won't gain much from a course. If you need a Cyber Security course to enroll in, you can enroll in mine by click on this &lt;a href="https://code.primidac.tech"&gt;link&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Practice! Practice!! Practice!!!&lt;/strong&gt; - Yes you have to practice to be good at anything and Cyber Security is no different. Spend time studying, asking questions and reading articles like mine 😉 [Every Mondays].&lt;/li&gt;
&lt;li&gt;Look out for a mentor - This would really help you and is really helpful, search for a mentor and follow his/her lead.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;That's it guys until next time, I hope this was really helpful and would love to hear from you guys.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Peace✌🏼&lt;/em&gt;&lt;/p&gt;

&lt;h6&gt;
  
  
  Primidac Codes
&lt;/h6&gt;

</description>
      <category>security</category>
      <category>codenewbie</category>
      <category>career</category>
    </item>
  </channel>
</rss>
