<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: a.infosecflavour</title>
    <description>The latest articles on Forem by a.infosecflavour (@yowise).</description>
    <link>https://forem.com/yowise</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1396018%2F40247bd8-51fd-48ea-9574-4f0c02d240b5.png</url>
      <title>Forem: a.infosecflavour</title>
      <link>https://forem.com/yowise</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/yowise"/>
    <language>en</language>
    <item>
      <title>SIEM-themed portfolio</title>
      <dc:creator>a.infosecflavour</dc:creator>
      <pubDate>Sat, 31 Jan 2026 23:12:20 +0000</pubDate>
      <link>https://forem.com/yowise/siem-themed-portfolio-4j5</link>
      <guid>https://forem.com/yowise/siem-themed-portfolio-4j5</guid>
      <description>&lt;p&gt;&lt;em&gt;This is a submission for the &lt;a href="https://dev.to/challenges/new-year-new-you-google-ai-2025-12-31"&gt;New Year, New You Portfolio Challenge Presented by Google AI&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  About Me
&lt;/h2&gt;

&lt;p&gt;I am Yo Wise, a "Vibe Coding" enthusiast with a heavy focus on system resiliency and observability. I believe that a developer's portfolio should be a demonstration of how they monitor, protect, and scale their work. I built this SIEM-themed dashboard to express my commitment to high-integrity development and defensive architecture. &lt;/p&gt;

&lt;h2&gt;
  
  
  Portfolio
&lt;/h2&gt;


&lt;div class="ltag__cloud-run"&gt;
  &lt;iframe height="600px" src="https://yowisesportfolio-595648544426.us-central1.run.app/"&gt;
  &lt;/iframe&gt;
&lt;/div&gt;


&lt;p&gt;My portfolio is a little of everything:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;SIEM dashboard&lt;/li&gt;
&lt;li&gt;Software Developer profile&lt;/li&gt;
&lt;li&gt;3 projects listed inside the profile - all focusing on different topics&lt;/li&gt;
&lt;li&gt;Cybersecurity inspired functionalities&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;My philosophy - &lt;strong&gt;No domain must exist in vacuum&lt;/strong&gt;. By building this portfolio, I blended AI, software development, cybersecurity, education, career development and tourism. &lt;a href="https://yowisesportfolio-595648544426.us-central1.run.app/" rel="noopener noreferrer"&gt;Check it out&lt;/a&gt; to convince yourself!&lt;/p&gt;

&lt;h2&gt;
  
  
  How I Built It
&lt;/h2&gt;

&lt;p&gt;The application is built using &lt;strong&gt;Google AI Studio&lt;/strong&gt;, with &lt;strong&gt;React 19&lt;/strong&gt;, &lt;strong&gt;Typescript&lt;/strong&gt; and &lt;strong&gt;Tailwind CSS&lt;/strong&gt;, using Lucide Icons  for the "Cyber-Ops" aesthetic and &lt;strong&gt;Recharts&lt;/strong&gt; for real-time telemetry visualization.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Gemini 3 Flash (Heuristic Scanner): Powers the Asset Integrity Scanner. Flash identifies technological fingerprints (frameworks, databases, architectural patterns) and returns them as structured JSON telemetry.&lt;/li&gt;
&lt;li&gt;Google Search Grounding: The scanner utilizes Search Tooling to verify the live status of domains, ensuring that complexity scores and tech-stack detections are grounded in real-time network data.&lt;/li&gt;
&lt;li&gt;Telemetry &amp;amp; Observability Layer Data Visualization: Utilizing Recharts, development velocity and resource allocation are rendered via Area and Bar Charts. This treats professional growth as a stream of system metrics rather than a static list.&lt;/li&gt;
&lt;li&gt;Node Health System: The skills section is mapped to a resource monitoring metaphor (CPU/Memory utilization), indicating the stability and "uptime" of each technology within my stack.&lt;/li&gt;
&lt;li&gt;Zero-Trust Methodology: Each UI component is treated as an isolated module (Scanner, Analyst, Logs), ensuring that the data flow is compartmentalized and modular.&lt;/li&gt;
&lt;li&gt;Enterprise SIEM Aesthetic: I opted for a "Slate/Blue" color palette to maintain the professional look of enterprise software. &lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  What I'm Most Proud Of
&lt;/h2&gt;

&lt;p&gt;I’m most proud of the "Log Ingestion" paradigm. Most portfolios use "Recent Projects" or "My Projects" sections; I used a SIEM Unified Event Stream. Every project is an "Event" with a timestamp, source domain, and severity level. &lt;/p&gt;

</description>
      <category>devchallenge</category>
      <category>googleaichallenge</category>
      <category>portfolio</category>
      <category>gemini</category>
    </item>
    <item>
      <title>ん, and?</title>
      <dc:creator>a.infosecflavour</dc:creator>
      <pubDate>Tue, 19 Aug 2025 22:35:15 +0000</pubDate>
      <link>https://forem.com/yowise/n-and-3mn1</link>
      <guid>https://forem.com/yowise/n-and-3mn1</guid>
      <description>&lt;p&gt;I recently came across a LinkedIn post about a typo squatting attack which transcended the well-known IDN homograph attacks (e.g: Latin, Greek, Cyrillic). The malicious actor was using the Japanese character ん.&lt;/p&gt;

&lt;p&gt;Intrigued by the meaning of this, I made a research and discovered it translates into "yes" (that's why title "ん, and?", similar to Ariana Grande's viral song "Yes, And?").&lt;/p&gt;

&lt;h2&gt;
  
  
  It all starts with phishing
&lt;/h2&gt;

&lt;p&gt;The victims receives a &lt;em&gt;phishing email&lt;/em&gt; which seems to originate from Booking. In fact, the adversaries masqueraded (&lt;a href="https://attack.mitre.org/techniques/T1036/" rel="noopener noreferrer"&gt;T1036&lt;/a&gt;) the legitimate company.  &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fh746utpqy3jbkbzl8nug.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fh746utpqy3jbkbzl8nug.png" alt="phishing email" width="800" height="877"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;According to a data breach &lt;a href="https://www.phishingbox.com/downloads/Verizon-Data-Breach-Investigations-Report-DBIR-2025.pdf" rel="noopener noreferrer"&gt;report&lt;/a&gt; issued by Verizon, phishing (&lt;a href="https://attack.mitre.org/techniques/T1566/" rel="noopener noreferrer"&gt;T1566&lt;/a&gt;) is the 3rd technique to obtain initial access (&lt;a href="https://attack.mitre.org/tactics/TA0001/" rel="noopener noreferrer"&gt;TA0001&lt;/a&gt;), being involved in 17% of &lt;strong&gt;breaches&lt;/strong&gt;. &lt;/p&gt;

&lt;p&gt;Analyzing the e-mail, one can observe elements such as:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;general greeting (&lt;em&gt;Dear Partner&lt;/em&gt;)&lt;/li&gt;
&lt;li&gt;the same greeting used in a sentence (&lt;em&gt;Dear Partner, the level of guest service...&lt;/em&gt;)&lt;/li&gt;
&lt;li&gt;the same greeting formula is used again in a sentence (&lt;em&gt;Dear Partner, kindly note that a buildup...&lt;/em&gt;)&lt;/li&gt;
&lt;li&gt;the message doesn't sound natural&lt;/li&gt;
&lt;li&gt;sentence ending in both "." and ":" (&lt;em&gt;All unresolved complaints are available for review here&lt;/em&gt;)&lt;/li&gt;
&lt;li&gt;sentence lacking in punctuation mark (which should have been a "." &lt;em&gt;We suggest that you carefully review the documentation and suggested solutions provided&lt;/em&gt;)&lt;/li&gt;
&lt;li&gt;while at a first glance the link wouldn't raise concerns, hovering over would reveal the URL is in fact hxxps[://]account[.]booking[.]comんdetailんrestric-access[.]www-account-booking[.]com/en/ (the punycode domain is account[.]booking[.]xn--comdetailrestric-access-ge5vga[.]www-account-booking[.]com)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;One could be easily tricked due to various reasons:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;getting lured by the masquerade &lt;/li&gt;
&lt;li&gt;lack of attention&lt;/li&gt;
&lt;li&gt;tiredness&lt;/li&gt;
&lt;li&gt;lack of cyber-education&lt;/li&gt;
&lt;li&gt;accidental click&lt;/li&gt;
&lt;li&gt;eyesight issues&lt;/li&gt;
&lt;li&gt;panic&lt;/li&gt;
&lt;li&gt;unfriendly dimension of the device screen&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Once the first stage is accomplished, the user is redirected to the following webpage:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2m6z7o1ob9zqr47cgkf1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2m6z7o1ob9zqr47cgkf1.png" alt="webpage" width="800" height="388"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Suspicious signs all the way
&lt;/h2&gt;

&lt;p&gt;What does the redirection page have to do with the received e-mail? The message was about complaints and then an account takeover was identified? That's how panic overtakes the critical thinking and the victim clicks on &lt;strong&gt;Terminate access&lt;/strong&gt;!  &lt;/p&gt;

&lt;p&gt;After clicking on the button, the victim must complete a Captcha challenge. After selecting the correct photos, the user is prompted to perform the following steps:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Open Run&lt;/li&gt;
&lt;li&gt;Press CTRL+ V&lt;/li&gt;
&lt;li&gt;Press Enter&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Once these steps are performed, a PowerShell script gets executed.&lt;/p&gt;

&lt;h2&gt;
  
  
  Sandbox detonation
&lt;/h2&gt;

&lt;p&gt;&lt;em&gt;Note&lt;/em&gt;: &lt;strong&gt;The following information serves for educational purposes only!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I decided to detonate the malicious URL in &lt;a href="https://tria.ge/" rel="noopener noreferrer"&gt;tria.ge&lt;/a&gt; sandbox.&lt;/p&gt;

&lt;p&gt;Given the page was already categorized as malicious (e.g: Radar Cloudflare, urlscan.io, VirusTotal) as it can be observed in the capture below,&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftqnyba0fkf9epdsda3p1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftqnyba0fkf9epdsda3p1.png" alt="Radar Cloudflare" width="800" height="377"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;there is a page warning the visitor that the website is a suspected phishing. This can be bypassed by resolving the challenge and clicking on Ignore &amp;amp; Proceed button (not solving the challenge would redirect the user to the page captured below which can also be encountered when analyzing the URL via urlscan.io)&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fe1cwsqvwg8xrwf1xyk2x.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fe1cwsqvwg8xrwf1xyk2x.png" alt="first_page" width="800" height="386"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqvhw195v4gbuo1dtugiy.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqvhw195v4gbuo1dtugiy.png" alt="nocaptcha" width="800" height="391"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdvo81tw6qeukxw2rl86x.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdvo81tw6qeukxw2rl86x.png" alt="ignore" width="800" height="382"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkk6wjuwcghewpw8ijqz5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkk6wjuwcghewpw8ijqz5.png" alt="webpage" width="800" height="384"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Clicking on the &lt;strong&gt;Terminate access&lt;/strong&gt; button   translates into solving a captcha challenge. If user tries to  interact with the link below the button, there is no visible redirect. Opening a separate tab would result into showing the same page.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwfownyq9eh8zxg7bsq3q.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwfownyq9eh8zxg7bsq3q.png" alt="click" width="800" height="448"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Although the correct images are selected, the captcha is invalid, so the user must execute the following verification steps:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frhzfy3mlr0wgq6axpx0r.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frhzfy3mlr0wgq6axpx0r.png" alt="steps" width="800" height="449"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Once the steps are executed, a PowerShell process is spawned, alongside other malicious background processes which can be observed in the below screenshots: &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqyzgs1wkf69o4ncd5dhw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqyzgs1wkf69o4ncd5dhw.png" alt="malicious_processes" width="800" height="453"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fociuxpdc01a8t3ja7whj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fociuxpdc01a8t3ja7whj.png" alt="mal_processes" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fr9nvw7mxbbt0ltf81air.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fr9nvw7mxbbt0ltf81air.png" alt="GTU" width="800" height="719"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;All of a sudden, I was prompted with a Windows Installer dialogue for... Vaquero!🤠&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8cmppl6jiemrx92cy9b6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8cmppl6jiemrx92cy9b6.png" alt="dialogue" width="800" height="426"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Other malicious processes: TurIndex.exe, BeaconFab.exe, PortalClien.exe, AdaptConductor.exe, NavigatorCobalt.exe. An exhaustive list can be extracted by investigating the malicious URL in a dedicated sandbox. &lt;br&gt;
During the analysis, the malware took control over the behaviour, closing the Task Manager and getting stuck in a loop of selecting the files present on desktop and randomly selecting the properties option, thusmaking user interaction impossible to be performed (for example, trying to run &lt;strong&gt;Start&lt;/strong&gt;) &lt;/p&gt;

&lt;p&gt;Note that, the payload can be pasted in a Notepad (this is to be done during the faux verification steps described earlier), just like you would paste it in the run command. Make sure you do this quickly enough. &lt;/p&gt;

&lt;h2&gt;
  
  
  Tria.ge report conclusions
&lt;/h2&gt;

&lt;p&gt;A full report can be generated by  interacting with the malicious URL in the Tria.ge dedicated sandbox. The results contain the following, but are not limited to:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://attack.mitre.org/techniques/T1055/" rel="noopener noreferrer"&gt;Suspicious use of NtCreateUserProcessOtherParentProcess&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.zscaler.com/blogs/security-research/technical-analysis-hijackloader" rel="noopener noreferrer"&gt;Hijack loader detected&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Blocklisted process makes network requests&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://attack.mitre.org/techniques/T1112/" rel="noopener noreferrer"&gt;Modified trusted root certificate store through registries&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="https://attack.mitre.org/techniques/T1115/" rel="noopener noreferrer"&gt;Clipboard data&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Dropped EXE executed&lt;/li&gt;
&lt;li&gt;Dropped DLL loaded&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Of course, you can run the URL in any other sandbox service, such as any.run, hybrid-analysis.com.&lt;/p&gt;

&lt;h2&gt;
  
  
  Beware of phishing
&lt;/h2&gt;

&lt;p&gt;With that said, make sure you stay safe online. &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Install a paid antivirus. &lt;/li&gt;
&lt;li&gt;Pay attention to anything suspicious. 
Hover the links. &lt;/li&gt;
&lt;li&gt;If on the tablet/ phone, press and hold the links (don't click!!). &lt;/li&gt;
&lt;li&gt;Make use of the critical thinking- was the e-mail expected? Why do I receive that? &lt;/li&gt;
&lt;li&gt;If you want to get in touch with a representative, do so through official means (do not contact the sources expressed in the message like phone numbers or e-mail addresses!).&lt;/li&gt;
&lt;li&gt;Report the e-mail as phishing.&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>cybersecurity</category>
      <category>learning</category>
      <category>writing</category>
      <category>security</category>
    </item>
    <item>
      <title>Building RoamSense: AI-powered accommodation review analysis for Romania</title>
      <dc:creator>a.infosecflavour</dc:creator>
      <pubDate>Tue, 15 Jul 2025 21:54:25 +0000</pubDate>
      <link>https://forem.com/yowise/building-roamsense-ai-powered-accommodation-review-analysis-for-romania-3n6e</link>
      <guid>https://forem.com/yowise/building-roamsense-ai-powered-accommodation-review-analysis-for-romania-3n6e</guid>
      <description>&lt;p&gt;&lt;u&gt;&lt;/u&gt;Hi all,&lt;/p&gt;

&lt;p&gt;You're thinking about ✨that holiday✨ for which you've been waiting for so long. Or perhaps it's something spontaneous like a city-break. Whichever the scenario is, accommodation plays an important part of the experience.&lt;/p&gt;

&lt;h2&gt;
  
  
  Meet RoamSense: Make an Informed Decision
&lt;/h2&gt;

&lt;p&gt;🎯 &lt;strong&gt;The technical challenge:&lt;/strong&gt; To build an application that provides an objective, data-driven analysis of accommodation reviews across Romania, cutting through the noise with intelligence.&lt;/p&gt;

&lt;p&gt;🫡 &lt;strong&gt;The mission:&lt;/strong&gt; To empower travelers to make informed decisions by reading behind the reviews and stars.&lt;/p&gt;

&lt;h2&gt;
  
  
  Diving into the Fundamentals &amp;amp; Features
&lt;/h2&gt;

&lt;p&gt;At its core, RoamSense is designed to simplify accommodation selection in Romania.&lt;/p&gt;

&lt;h3&gt;
  
  
  1. Smart review processing engine
&lt;/h3&gt;

&lt;p&gt;This is where the magic happens. I built my review processing engine using Google AI Studio – and honestly, it was a game-changer. Here's how it works:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Gemini API Integration:&lt;/strong&gt; I leveraged the Gemini API for natural language processing (NLP) and sentiment analysis. This wasn't just about positive/negative; it was about understanding nuanced opinions and extracting structured data from unstructured text.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Prompt engineering:&lt;/strong&gt; A significant part of the challenge was designing prompts to extract structured, comparable insights from unstructured, often colloquial, reviews.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Pre-trained models:&lt;/strong&gt; Google's pre-trained models handled the heavy lifting, allowing me to focus on extracting specific patterns relevant to accommodation quality.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;API-first approach:&lt;/strong&gt; This design allows for real-time processing of reviews without me needing to manage complex ML infrastructure myself.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  2. User-Centric design
&lt;/h3&gt;

&lt;p&gt;While the AI is under the hood, the user experience is paramount. I focused on:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Intuitive interface:&lt;/strong&gt; Nobody wants to read documentation for a travel app. It had to feel natural.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Responsive design:&lt;/strong&gt; Works seamlessly on any device.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  3. Not sure where to go? Let RoamSense surprise you
&lt;/h3&gt;

&lt;p&gt;If you're unsure where to start, you can pick a random city like Brașov, Iași, or Bucharest, and RoamSense will randomly display a series of accommodations with their insights. Just throw a dart at the map!&lt;/p&gt;

&lt;h3&gt;
  
  
  4. Comparison Feature
&lt;/h3&gt;

&lt;p&gt;One of the most technically challenging features was the comparison system. Users can compare accommodations either by:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Manual input:&lt;/strong&gt; Traditional user-driven selection.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Pre-generated Lists:&lt;/strong&gt; Algorithm-suggested comparisons based on user preferences and my data-driven insights.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  5. Comprehensive Feature Set
&lt;/h3&gt;

&lt;p&gt;On &lt;a href="https://roamsense.io/" rel="noopener noreferrer"&gt;RoamSense.io&lt;/a&gt;, you'll find:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;A powerful &lt;strong&gt;Search&lt;/strong&gt; function to &lt;em&gt;roam&lt;/em&gt; through all the analyzed Romanian accommodation reviews.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Input lists for organizing and comparing your selections.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Multi-language Support:&lt;/strong&gt; The possibility to switch between EN and RO, addressing both local and international populations.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;A &lt;strong&gt;Security Guide,&lt;/strong&gt; specifically designed to protect your digital identity when booking an accommodation – a crucial, yet often overlooked, aspect.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;A &lt;strong&gt;Checklist&lt;/strong&gt; with questions to ask yourself before booking an accommodation.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;The Manifesto,&lt;/strong&gt; which articulates the &lt;u&gt;WHY&lt;/u&gt; behind RoamSense's existence.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Demo
&lt;/h2&gt;

&lt;p&gt;I decided to use StoryLane for the &lt;a href="https://app.storylane.io/share/dnjlr4wgti9z" rel="noopener noreferrer"&gt;demo experience&lt;/a&gt;. Honestly, it's the first time I use StoryLane and I must say it's definitely a tool that speaks more than 1000 words. I really admire how the AI agent just understands the topic of presentation.&lt;/p&gt;

&lt;h2&gt;
  
  
  Technical Learnings &amp;amp; My Development Experience
&lt;/h2&gt;

&lt;p&gt;Building RoamSense taught me some invaluable lessons about user-focused development and leveraging modern AI:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;AI Efficiency is Real:&lt;/strong&gt; Leveraging Google AI Studio and Gemini API dramatically cut down on development time for complex NLP tasks. I focused on prompt engineering and integration rather than building models from scratch, which saved months.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Data, not drama&lt;/strong&gt;: This core principle became paramount. Effective review processing means extracting meaningful, actionable insights (the "data") rather than just sifting through large volumes of raw, often subjective feedback (the "drama")&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  What's Next for RoamSense
&lt;/h2&gt;

&lt;p&gt;RoamSense is still evolving, but the core systems are robust. The next phases involve:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;API optimization for even faster response times.&lt;/strong&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Mobile-first improvements and dedicated app development.&lt;/strong&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Advanced ML models for even deeper review analysis.&lt;/strong&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;User Login &amp;amp; AI-Analyzed Reporting:&lt;/strong&gt; Introducing a login system to allow users to directly report accommodations' pros and cons, with all submissions being &lt;strong&gt;AI-analyzed&lt;/strong&gt; to further enrich the data with objective, community insights.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Connect &amp;amp; Collaborate on RoamSense
&lt;/h2&gt;

&lt;p&gt;If you're working on travel tech, location-based services, review analysis systems, or anything involving AI for real-world problems, I'd love to connect and share insights. The intersection of travel and technology has huge potential.&lt;/p&gt;

&lt;p&gt;Ready to experience smarter travel planning? Visit &lt;a href="https://roamsense.io/" rel="noopener noreferrer"&gt;RoamSense.io&lt;/a&gt; and explore the demo in action!&lt;/p&gt;

&lt;p&gt;Drop your thoughts or questions in the comments below – have you tackled similar challenges with review analysis or travel tech?&lt;/p&gt;

&lt;p&gt;You can find other ways to connect at the end of the article.&lt;/p&gt;

&lt;h2&gt;
  
  
  Tech Stack
&lt;/h2&gt;

&lt;p&gt;Here's the stack I used for RoamSense:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;AI/ML:&lt;/strong&gt; Google AI Studio with Gemini API for review analysis&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Frontend:&lt;/strong&gt; React&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Backend:&lt;/strong&gt; Serverless functions (leveraging APIs for specific data processing needs)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Database:&lt;/strong&gt; serverless data storage (focused on efficient retrieval of analyzed insights)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Infrastructure:&lt;/strong&gt; Managed cloud services&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Connect &amp;amp; Support RoamSense
&lt;/h2&gt;

&lt;p&gt;Enjoyed this deep dive into RoamSense? There are more ways to connect and support my journey:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;All My Links:&lt;/strong&gt; Find everything RoamSense in one place on my &lt;a href="https://linktr.ee/roamsense" rel="noopener noreferrer"&gt;Linktree&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Buy Me a Coffee:&lt;/strong&gt; If you appreciate my work, you can support my development efforts on &lt;a href="https://ko-fi.com/roamsense" rel="noopener noreferrer"&gt;Ko-fi&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Follow My Journey:&lt;/strong&gt; Stay updated with visual content and product developments on my &lt;a href="https://www.instagram.com/roamsense/" rel="noopener noreferrer"&gt;Instagram.&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;What are your thoughts on AI-powered review analysis? Have you built similar travel tech solutions? Let's discuss in the comments! 👇&lt;/em&gt;&lt;/p&gt;

</description>
      <category>react</category>
      <category>nlp</category>
      <category>gemini</category>
      <category>ai</category>
    </item>
    <item>
      <title>Build a SOC simulator using Google AI Studio</title>
      <dc:creator>a.infosecflavour</dc:creator>
      <pubDate>Thu, 03 Jul 2025 17:50:54 +0000</pubDate>
      <link>https://forem.com/yowise/build-a-soc-simulator-using-google-ai-studio-2ffk</link>
      <guid>https://forem.com/yowise/build-a-soc-simulator-using-google-ai-studio-2ffk</guid>
      <description>&lt;p&gt;Hi! 🌟&lt;/p&gt;

&lt;p&gt;Inspired by the #learningaistudio challenge, I decided to leverage the capabilities of Google AI Studio by building a &lt;strong&gt;S&lt;/strong&gt;&lt;strong&gt;O&lt;/strong&gt;&lt;strong&gt;C&lt;/strong&gt; simulator.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why a Security Operations Center simulator?
&lt;/h2&gt;

&lt;p&gt;Having a robust Security Operations Center is a critical point for any organization which aims to become security mature. While this benefits the organization as a whole, focusing on a micro-perspective, it helps the cybersecurity analysts to properly manage the alerts. &lt;br&gt;
Probably you stumbled across the term &lt;em&gt;alert fatigue&lt;/em&gt;. This represents a common undesired situation, which can be avoided by having a well-built SOC. Give a search on Google and you'll find a lot of content related to this phenomenon.&lt;/p&gt;

&lt;p&gt;Using the Build function in Google AI Studio, I offered this prompt&lt;br&gt;
&lt;em&gt;Imagine you are a SOC professional with 10 years experience. Build a SOC simulator having capabilities similar to Splunk and Elastic.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3z2drf6o523xmu6ljalu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3z2drf6o523xmu6ljalu.png" alt="soc_simulator" width="800" height="388"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Here's what you can find:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;On the left- pane side, there's the alert queue, showing 5 alerts of different severity levels: critical, high, medium and low. It's displayed also the corresponding status New, Investigating Resolved.&lt;/li&gt;
&lt;li&gt;On the top, 4 tiles display the number of total alerts, of new incidents, of critical alerts and that of high- severity alerts&lt;/li&gt;
&lt;li&gt;In the center there is the alert title, details and log, AI incident response book which gives the possibility to check each step (massive help for self-organization)
-On the top right corner of the central pain, the analyst can select the status.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Improvements
&lt;/h2&gt;

&lt;p&gt;While the result is impressive, certain improvements could be done:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;assign a responsible&lt;/li&gt;
&lt;li&gt;classify the alert as false positive or true positive&lt;/li&gt;
&lt;li&gt;write an incident report checked by AI&lt;/li&gt;
&lt;li&gt;export statistics in CSV, PDF, JSON&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Final thoughts
&lt;/h2&gt;

&lt;p&gt;Pretty impressive what you can reach with Google AI Studio. The AI playbooks are handy so the responder can fully concentrate on the actions to be done.&lt;/p&gt;

&lt;p&gt;Let me know your thoughts about this!&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>ai</category>
      <category>gemini</category>
      <category>learning</category>
    </item>
    <item>
      <title>Build an app with Google AI Studio | Comic Creator</title>
      <dc:creator>a.infosecflavour</dc:creator>
      <pubDate>Thu, 03 Jul 2025 12:40:12 +0000</pubDate>
      <link>https://forem.com/yowise/build-an-app-with-google-ai-studio-comic-creator-5f0p</link>
      <guid>https://forem.com/yowise/build-an-app-with-google-ai-studio-comic-creator-5f0p</guid>
      <description>&lt;p&gt;&lt;em&gt;This post is my submission for &lt;a href="https://dev.to/deved/build-apps-with-google-ai-studio"&gt;DEV Education Track: Build Apps with Google AI Studio&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  What I Built
&lt;/h2&gt;

&lt;p&gt;Thanks to Google AI Studio, I built a short and sweet comic &lt;strong&gt;page&lt;/strong&gt; (rather than comic book). User is able to provide input and in a few moments, the content is ready. Meet Comic Creator! &lt;/p&gt;

&lt;h2&gt;
  
  
  Demo
&lt;/h2&gt;

&lt;p&gt;Here is my prompt:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;please create a 4 panel comic page called Comic Creator which allows the user to provide an input. Use Perspective API and Gemini for the input filtering. Use Imagen for image generation and Gemini for text generation.&lt;/li&gt;
&lt;li&gt;provide consistency and logic &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Examples:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl4beis7dotr6bcp8mk9i.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl4beis7dotr6bcp8mk9i.png" alt="prompt" width="800" height="763"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhkno3clvyf02jvc2xh3d.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhkno3clvyf02jvc2xh3d.png" alt="comic_creator_1" width="800" height="812"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9w5b5kdc3umxbq4hzb4m.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9w5b5kdc3umxbq4hzb4m.png" alt="comic_creator_2" width="800" height="812"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Posted on &lt;a href="https://github.com/Yowise/comic-creator.git" rel="noopener noreferrer"&gt;GitHub&lt;/a&gt;? Checked! ✅&lt;/p&gt;

&lt;h2&gt;
  
  
  My Experience
&lt;/h2&gt;

&lt;p&gt;It's essential to know what you want- then adapt! One idea flows after another. That's the beauty of creation. While significant improvements can be made in terms of the result, I believe this is a good way to bring ideas to life. &lt;/p&gt;

</description>
      <category>deved</category>
      <category>learngoogleaistudio</category>
      <category>ai</category>
      <category>gemini</category>
    </item>
    <item>
      <title>Dreaming | TryHackMe</title>
      <dc:creator>a.infosecflavour</dc:creator>
      <pubDate>Mon, 30 Jun 2025 21:00:00 +0000</pubDate>
      <link>https://forem.com/yowise/dreaming-tryhackme-49eo</link>
      <guid>https://forem.com/yowise/dreaming-tryhackme-49eo</guid>
      <description>&lt;p&gt;🟩 Level of the challenge: Easy&lt;/p&gt;

&lt;p&gt;Tools used:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Nmap &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;GoBuster &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;SSH &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;MySQL &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Python &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;Starting in 3, 2 1...&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Welcome to the world of dreams! The "&lt;a href="https://tryhackme.com/room/dreaming" rel="noopener noreferrer"&gt;Dreaming&lt;/a&gt;" challenge from TryHackMe is a beautifully crafted fantasy-themed box that takes us on a journey through the realm of Lucian, Death and Morpheus. &lt;br&gt;
What makes this box special isn't just the technical aspects - it's how the creators wove together Greek mythology with cybersecurity concepts. &lt;/p&gt;

&lt;h2&gt;
  
  
  Initial Enumeration
&lt;/h2&gt;

&lt;p&gt;I initiated the assessment using&lt;br&gt;&lt;br&gt;
&lt;code&gt;nmap -A -v [target-ip]&lt;/code&gt;&lt;br&gt;
to discover the following open ports:&lt;br&gt;
SSH (22) - Our potential gateway once we find some credentials&lt;br&gt;
HTTP (80) - A web service running Apache &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6winli4qqtftn5ipbb2x.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6winli4qqtftn5ipbb2x.png" alt="nmap" width="800" height="422"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Given that port 80 is open, let's follow the path of...&lt;/p&gt;

&lt;h2&gt;
  
  
  Web Enumeration
&lt;/h2&gt;

&lt;p&gt;Down the rabbit hole, I was greeted by... drumroll please... the Apache default page!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffd4nkmynjbwzjprhfsbg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffd4nkmynjbwzjprhfsbg.png" alt="web-enumeration" width="800" height="639"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You know that feeling when you see a default page? It's like opening a book and finding the first page blank - there's definitely more to the story, but you need to dig deeper. This was clearly a job for directory enumeration.&lt;/p&gt;

&lt;h2&gt;
  
  
  Directory Brute-forcing with GoBuster
&lt;/h2&gt;

&lt;p&gt;I continued by using &lt;code&gt;GoBuster&lt;/code&gt;:&lt;br&gt;
&lt;code&gt;gobuster dir -u http://[target-ip] -w [wordlist]&lt;/code&gt;&lt;br&gt;
The &lt;code&gt;/app&lt;/code&gt; directory was found.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fykvgrwc6z7qb6tl02qew.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fykvgrwc6z7qb6tl02qew.png" alt="gobuster" width="800" height="272"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I accessed the page and discovered a folder called &lt;code&gt;pluck-4.7.13/&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F65mulfxhkvvtirfkm7l0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F65mulfxhkvvtirfkm7l0.png" alt="app" width="632" height="256"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Web Application Analysis
&lt;/h2&gt;

&lt;p&gt;Navigating to &lt;code&gt;/app&lt;/code&gt;, I was greeted by a page containing a quote:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fam6dtzzjf054r82rpdgf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fam6dtzzjf054r82rpdgf.png" alt="quote" width="800" height="136"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Bottom it can be observed the &lt;code&gt;admin&lt;/code&gt; page. Where is that going to bring us to...?&lt;/p&gt;

&lt;p&gt;The login page. In this situation, we can either perform some trial and error or to go for some OSINT and look for the default password of this CMS. Exploring mode activated! 🕵️&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Faqnuk0w3f41ijk2vxg5p.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Faqnuk0w3f41ijk2vxg5p.png" alt="login" width="800" height="248"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After some digging through documentation and forums, I found the default credentials. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F23ik33mxebpjiq03hj6b.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F23ik33mxebpjiq03hj6b.png" alt="admin" width="800" height="308"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;That moment when the credentials work and you are actually inside the application? Pure magic! I spent a good amount of time just clicking around, understanding the application's structure. This isn't just about rushing to the next step - it's about understanding your environment.&lt;/p&gt;

&lt;p&gt;Discovering the upload page was exactly what I needed. All I had to do was to surf on the web and search in exploit db (or searchsploit if you prefer CLI) a payload tailored for file upload vulnerability found in pluck-4.7.13. Exploit 49909 was the one.&lt;/p&gt;

&lt;p&gt;Once the shell spawned, checked &lt;code&gt;whoami&lt;/code&gt; and what the directory I was in contained.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnrnn0i5rtja0f4hyebqz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnrnn0i5rtja0f4hyebqz.png" alt="shell" width="800" height="478"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;And then changed directory to root (&lt;code&gt;/&lt;/code&gt;)&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frjib5ui8i7gdg8dukklu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frjib5ui8i7gdg8dukklu.png" alt="pwd" width="800" height="477"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The &lt;code&gt;/opt&lt;/code&gt; directory caught my attention because, that's where &lt;strong&gt;opt&lt;/strong&gt;ional software typically lives.&lt;br&gt;
I discovered two Python scripts:&lt;br&gt;
-getDreams.py&lt;br&gt;
-test.py &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqpiy4eixu1za2uh5mdnz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqpiy4eixu1za2uh5mdnz.png" alt="python_scripts" width="262" height="85"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I wonder what's inside the script &lt;code&gt;getDreams&lt;/code&gt;. Am I dreaming? These are &lt;code&gt;Death&lt;/code&gt;'s MySQL credentials! Or are they? We could test them or check &lt;code&gt;test.py&lt;/code&gt;. I'd rather go on with checking the script, because based on the order of flag retrievals, we definitely must get &lt;code&gt;Lucien&lt;/code&gt;'s flag and then &lt;code&gt;Death&lt;/code&gt;'s. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fn3okzi3x6dx4gbultmhq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fn3okzi3x6dx4gbultmhq.png" alt="python" width="800" height="419"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fs9dgtcjrtus3nyvflbkp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fs9dgtcjrtus3nyvflbkp.png" alt="script" width="800" height="411"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Looking at the code, the following vulnerability is observed &lt;strong&gt;Command Injection&lt;/strong&gt;. The combination between the user input and &lt;code&gt;shell=True&lt;/code&gt; results into a high risk of command injection. Basically, as a malicious actor can alter the integrity of the database by creating the name of the dreamer and instead of a legitimate input (like, the dream- Want to become a famous singer 🎤), would provide a &lt;strong&gt;command&lt;/strong&gt;, with the final result of breaching the confidentiality. We'll see that in action a bit later. Let's move on to &lt;code&gt;test.py&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;In &lt;code&gt;test.py&lt;/code&gt;, we literally found one &lt;code&gt;Lucien&lt;/code&gt;'s password. But I keep it redacted:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7h01l3wekne480nrf0a5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7h01l3wekne480nrf0a5.png" alt="lucien" width="800" height="369"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Finding credentials hardcoded in scripts is like finding a $20 bill in an old jacket - unexpected but incredibly welcome! The developers had left Lucian's password right there in the Python code. 🤩&lt;br&gt;
It's a classic security mistake that we see all too often in real-world scenarios. Developers think, "It's just a test script" or "Only we have access to this."- however this translates into &lt;strong&gt;Insecure Credential Storage&lt;/strong&gt;. &lt;/p&gt;

&lt;h2&gt;
  
  
  Lateral Movement
&lt;/h2&gt;

&lt;p&gt;&lt;code&gt;ssh lucian@[target-ip]&lt;/code&gt;&lt;br&gt;
That satisfying moment when SSH accepts your credentials and you get your first proper shell! No more web application limitations - now we're on the actual system. I will look around and grab that user flag! At the same time- let's be conscious: it's not over yet! We still have two other characters whose flags can't just escape. So, after grabbing my first treasure, I will have a look into the first file, i.e &lt;code&gt;.bash_history&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvoqfxjetl1cdknqmoxb0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvoqfxjetl1cdknqmoxb0.png" alt="ssh" width="800" height="940"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This is where things got really interesting. Not only have we discovered MySQL credentials [password redacted], but it can be deducted there was a privilege escalation at some point. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftlwpjzv91ed9sog1sxui.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftlwpjzv91ed9sog1sxui.png" alt="script" width="577" height="1081"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I connected on the MySQL database using the credentials found&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffvup30xo270kw7ly59ne.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffvup30xo270kw7ly59ne.png" alt="sql" width="766" height="961"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The first step after connecting is performing reconnaissance by using the command &lt;code&gt;show tables;&lt;/code&gt;, followed by &lt;code&gt;select* from dreams;&lt;/code&gt;. Given the data obtained- remember the &lt;strong&gt;Command Injection&lt;/strong&gt; vulnerability detailed earlier? Now it's time to exploit that, by inserting a new row in the table which contains a script for shell spawning.&lt;br&gt;
The next step is checking the sudo capabilites of &lt;code&gt;lucien&lt;/code&gt;. We discover that the user doesn't need a password to perform the command outlined in the screenshot. Essentially, the current user can execute &lt;code&gt;getDreams.py&lt;/code&gt; script as &lt;code&gt;death&lt;/code&gt; and become that user. As it can be observed, the manual entry provided earlier is not visible.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fojky56wm29j6n350h6af.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fojky56wm29j6n350h6af.png" alt="lucien" width="800" height="761"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We're going to ensure &lt;code&gt;lucien&lt;/code&gt; has the privilege to run &lt;code&gt;getDreams.py&lt;/code&gt; script by running &lt;code&gt;chmod 777 getDreams.py&lt;/code&gt;. Essentially, this gives read, write, execute permissions, thus establishing persistence.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fios9h00kngywbs9vjxql.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fios9h00kngywbs9vjxql.png" alt="script" width="715" height="457"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;That's an optional step, by the way.&lt;/p&gt;

&lt;h2&gt;
  
  
  Password and Mythology
&lt;/h2&gt;

&lt;p&gt;I would like to ask you: did you know that Democritus trained himself for this inevitable event by going into solitude and often visiting the palms? What's Democritus' business in this whole challenge? You will get that when you see &lt;code&gt;death&lt;/code&gt;'s password 😉. I won't be revealing it here, but access &lt;code&gt;getDreams.py&lt;/code&gt; from &lt;code&gt;/death&lt;/code&gt; and not from &lt;code&gt;/opt&lt;/code&gt; and you'll get there.&lt;br&gt;
I love how this challenge weaves philosophical references throughout the technical content. It's not just about exploitation - it's about the journey, the preparation, the patience required to succeed. Democritus understood that mastery comes through deliberate practice and isolation from distractions. Kind of like how we need to focus deeply when we're working through complex privilege escalation paths!&lt;/p&gt;

&lt;p&gt;By the way, here is the flag: &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4g8jkqvo5dhl9j2hlg5u.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4g8jkqvo5dhl9j2hlg5u.png" alt="flag" width="577" height="244"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  The Python Script mystery
&lt;/h2&gt;

&lt;p&gt;Here's where the challenge got really clever. The &lt;code&gt;getdreams&lt;/code&gt; Python script in the current directory wasn't the same as the one in /opt. This kind of PATH confusion is a common real-world privilege escalation vector. The system would execute the local script with elevated privileges because of how the permissions were set up.&lt;/p&gt;

&lt;h2&gt;
  
  
  Privilege Escalation
&lt;/h2&gt;

&lt;p&gt;The God of Dreams Guards His Secrets.&lt;br&gt;
Of course, Morpheus saved the best for him. Only in our dreams we could have accessed the file by being someone else than the God of Dreams and the son of Hypnos.&lt;/p&gt;

&lt;p&gt;I checked whether might be temporary assignments...however, nothing came to avail.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fesu280m5dpqqo7j6aasc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fesu280m5dpqqo7j6aasc.png" alt="death" width="625" height="898"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Thus, I leveraged the power of &lt;code&gt;find&lt;/code&gt;, to find files with SUID set&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhlf8ydr02nzgnolin744.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhlf8ydr02nzgnolin744.png" alt="find" width="800" height="41"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1mpgy8s8z3bj5mmn6361.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1mpgy8s8z3bj5mmn6361.png" alt="suid" width="800" height="295"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  The Final Modification
&lt;/h2&gt;

&lt;p&gt;The final step involved modifying the &lt;code&gt;shutil.py&lt;/code&gt;) to grant us the permissions we needed. Notice the line in green brackets: that's what we need to add so we can elevate the privileges.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fde9mf2ocv6380biw1lw6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fde9mf2ocv6380biw1lw6.png" alt="sh" width="800" height="1050"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;And here is the flag:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5t5gbjole64uk7olubmc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5t5gbjole64uk7olubmc.png" alt="morpheus" width="747" height="376"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;p&gt;This was an astonishing tour in Lucian, Death and Morpheus world. It's time to wake up for the next challenge. Let my know your thoughts!&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>writing</category>
    </item>
    <item>
      <title>My first portfolio in Figma</title>
      <dc:creator>a.infosecflavour</dc:creator>
      <pubDate>Fri, 27 Jun 2025 18:21:27 +0000</pubDate>
      <link>https://forem.com/yowise/my-first-portfolio-in-figma-ofh</link>
      <guid>https://forem.com/yowise/my-first-portfolio-in-figma-ofh</guid>
      <description>&lt;p&gt;Good day,&lt;/p&gt;

&lt;p&gt;I'm proudly announcing you that my first Figma portfolio is ready! &lt;br&gt;
🗣️: &lt;em&gt;What, are you a web-designer now?&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;No! You don't have to be a web-designer to create a portfolio in Figma. In fact, I illustrated my cyber security learning journey through it.&lt;/p&gt;

&lt;p&gt;Check it out &lt;a href="https://www.figma.com/proto/leYgddMK6jYlxiXUBzjwv5/YoWise?node-id=0-1&amp;amp;t=UnYNgdMAl6JZXTm6-1" rel="noopener noreferrer"&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;While indeed- it's a prototype and not actually published to Figma Community, the portfolio is ready to be explored.🌐&lt;/p&gt;

&lt;p&gt;🗣️: &lt;em&gt;Why did you create it in Figma?&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Because I find the platform extremely interesting! Based more on visuals than on writing, you can create a beautiful narration through images, animations and external links, with no code.&lt;/p&gt;

&lt;h2&gt;
  
  
  Landing page
&lt;/h2&gt;

&lt;p&gt;The first moment you access the portfolio, you'll recognize pop-art elements. I wanted to express myself through this style, breaking free from the usual cyber security themed patterns.&lt;/p&gt;

&lt;p&gt;The screenshot below illustrates a glimpse of the landing page, presenting the first section.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fen2bd0g3dh3mzqew6vyz.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fen2bd0g3dh3mzqew6vyz.jpg" alt="homepage-screenshot" width="800" height="1394"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Website sections
&lt;/h2&gt;

&lt;p&gt;Curious what you can find in my portfolio? On the landing page, I created three sections two of them being divided in other sub-sections. Each of the section has its own flavour.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
Walk through&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;➡️DEV blog (yes, I am showcasing my blog!)&lt;br&gt;
➡️Projects&lt;br&gt;
➡️Token info&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Curriculum Vitae, Certifications &amp;amp; Professional Contact&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;What languages do I know?&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;👉 Technologies&lt;br&gt;
👉 Foreign languages&lt;/p&gt;

&lt;p&gt;Let's take everything step-by-step. 🪜&lt;/p&gt;

&lt;h2&gt;
  
  
  Walk through
&lt;/h2&gt;

&lt;p&gt;This section hosts a compilation of write-ups and projects + an about me type of page. Walk through the path of my learning journey. 👟&lt;br&gt;
The moment you click on &lt;strong&gt;DEV blog&lt;/strong&gt; section, a new tab will open with a prompt message announcing you are about to leave Figma. With that said, the redirect is not automatic, unless you'll check the box under the message so that on your 2nd visit the DEV.to page will open directly. &lt;strong&gt;Projects&lt;/strong&gt; represents the reference for my &lt;a href="https://www.notion.so/21280675ddf880758144d4d9e6f3cafe?v=21280675ddf880b89dca000c2c4eb79c" rel="noopener noreferrer"&gt;Notion.so&lt;/a&gt; projects. &lt;br&gt;
Where you can &lt;em&gt;get&lt;/em&gt; a short &lt;em&gt;identity&lt;/em&gt; description of &lt;code&gt;whoami&lt;/code&gt; and how to get in touch with me is on the suggestive page titled &lt;strong&gt;Token info&lt;/strong&gt;.  &lt;/p&gt;

&lt;h2&gt;
  
  
  Curriculum Vitae, Certifications &amp;amp; Professional Contact
&lt;/h2&gt;

&lt;p&gt;What would be a portfolio without pointing out the course of life (English for &lt;em&gt;curriculum vitae)&lt;/em&gt; and formal acknowledges of life- long development? The documents themselves are hosted externally and can be provided upon request. Click on the link referenced in the section, to find out more! &lt;/p&gt;

&lt;h2&gt;
  
  
  What languages do I know?
&lt;/h2&gt;

&lt;p&gt;A technology is like a foreign language. Whether you try to learn Spanish or demystify GCP, when you first encounter that you won't understand a thing! Progressively, the S3 and EC2 will be a piece of cake, as the German articles. 📎 &lt;/p&gt;

&lt;p&gt;Under &lt;u&gt;&lt;strong&gt;Technologies&lt;/strong&gt;&lt;/u&gt;, you can find the tech stack I operate with, while under &lt;u&gt;&lt;strong&gt;Foreign languages&lt;/strong&gt; &lt;/u&gt;I showcase my knowledge level in English, German and French. &lt;br&gt;
&lt;u&gt;&lt;strong&gt;Technologies&lt;/strong&gt;&lt;/u&gt; steals the show by being constructed with star- rating animation in mind. Thanks to Star Maker plugin and this &lt;a href="https://www.youtube.com/watch?v=8XMEgIO-Obs" rel="noopener noreferrer"&gt;tutorial&lt;/a&gt;, I managed to breathe life into my idea.🌠&lt;br&gt;
On the stage performs as no other &lt;u&gt;&lt;strong&gt;Foreign languages&lt;/strong&gt; &lt;/u&gt;, with a progress bar type of animation, due to this wonderful &lt;a href="https://www.figma.com/design/U0d1ixJLGqwfc3ZTQU2UVc/Figma-Interactive-Progress-Bars-UI-Design--Community-?node-id=4-218&amp;amp;t=zPSVZHbrxzldhGuJ-0" rel="noopener noreferrer"&gt;design&lt;/a&gt;. By the way, which of these animations do you like the most? Let me know in the comments! &lt;/p&gt;




&lt;p&gt;What's your input so far? Have you ever done a portfolio on Figma? Add your value to the discussion and hit the submit button. 😎&lt;br&gt;
For getting in touch, have a look &lt;a href="//linktr.ee/yowise"&gt;here&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>portfolio</category>
      <category>cybersecurity</category>
      <category>writing</category>
      <category>community</category>
    </item>
    <item>
      <title>SOC167 - LS Command Detected in Requested URL | Letsdefend.io</title>
      <dc:creator>a.infosecflavour</dc:creator>
      <pubDate>Wed, 25 Jun 2025 06:16:00 +0000</pubDate>
      <link>https://forem.com/yowise/soc167-ls-command-detected-in-requested-url-letsdefendio-d4b</link>
      <guid>https://forem.com/yowise/soc167-ls-command-detected-in-requested-url-letsdefendio-d4b</guid>
      <description>&lt;p&gt;Hi everyone! Are you up for an easy blue team challenge? 🔷🔹🔷&lt;/p&gt;

&lt;h2&gt;
  
  
  Detection
&lt;/h2&gt;

&lt;p&gt;While browsing through my daily alarms, I found this high- severity alert &lt;strong&gt;SOC167 - LS Command Detected in Requested URL&lt;/strong&gt;. So I decided to take ownership on it. &lt;/p&gt;

&lt;p&gt;Event ID: 117&lt;br&gt;
Event Time: Feb, 27, 2022, 12:36 AM&lt;br&gt;
Rule: SOC167 - LS Command Detected in Requested URL&lt;br&gt;
Level: Security Analyst&lt;br&gt;
Hostname: EliotPRD&lt;br&gt;
Destination IP Address: 188.114.96.15&lt;br&gt;
Source IP Address: 172.16.17.46&lt;br&gt;
HTTP Request Method: GET&lt;br&gt;
Requested URL :&lt;br&gt;
hxxps[://]letsdefend[.]io/blog/?s=skills&lt;br&gt;
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:24.0) Gecko/20100101 Firefox/24.0&lt;br&gt;
Alert Trigger Reason: URL Contains LS&lt;br&gt;
Device Action: Allowed&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fo3rbd2f33vt0u6guccb9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fo3rbd2f33vt0u6guccb9.png" alt="alarm-details" width="800" height="226"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;My first guess is that the alert triggered because of the word "skills", which contains "ls" (the reason the alert triggered for). But what's special at "ls"?&lt;/p&gt;

&lt;p&gt;The &lt;code&gt;ls&lt;/code&gt; command is used to list files or directories in Linux and other Unix-based operating systems (&lt;a href="https://www.freecodecamp.org/news/the-linux-ls-command-how-to-list-files-in-a-directory-with-options/" rel="noopener noreferrer"&gt;source&lt;/a&gt;). If you want to find out more how malicious actors leverage the Linux commands to conduct attacks, then it's worth reading &lt;a href="https://hacklido.com/blog/989-command-injection-leveraging-os-commands-for-exploits" rel="noopener noreferrer"&gt;this article&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;As I deep into &lt;strong&gt;analysis&lt;/strong&gt; stage, first and foremost I start the playbook.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffemujomu0h9jqbtdfqr6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffemujomu0h9jqbtdfqr6.png" alt="playbook" width="800" height="159"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fikrbng9r3ijh5fdo5ioe.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fikrbng9r3ijh5fdo5ioe.png" alt="understand" width="800" height="468"&gt;&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpr98kivdtmdy5lqev8lo.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpr98kivdtmdy5lqev8lo.png" alt="pb" width="800" height="523"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Even if listed earlier these artifacts, I want to do so again in order to translate the information into something friendlier.&lt;/p&gt;

&lt;p&gt;Event Time: Feb, 27, 2022, 12:36 AM&lt;/p&gt;

&lt;p&gt;Hostname: EliotPRD&lt;/p&gt;

&lt;p&gt;Destination IP Address: 188.114.96.15&lt;/p&gt;

&lt;p&gt;Source IP Address: 172.16.17.46&lt;/p&gt;

&lt;p&gt;HTTP Request Method: GET&lt;/p&gt;

&lt;p&gt;Requested URL: hxxps[://]letsdefend[.]io/blog/?s=skills&lt;/p&gt;

&lt;p&gt;User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:24.0) Gecko/20100101 Firefox/24.0&lt;/p&gt;

&lt;p&gt;Device Action: Allowed&lt;/p&gt;

&lt;p&gt;It was observed on &lt;strong&gt;27th of February 12:36&lt;/strong&gt; that host EliotPRD, which is belongs to IP 172.16.17.46, sent a GET request to the web-browser Mozilla Firefox version 24.0 for Ubuntu hxxps[://]letsdefend[.]io/blog/?s=skills which is belongs to IP 188.114.96.15. &lt;/p&gt;

&lt;p&gt;You can find out more about the User-Agent if you leverage the search capabilities of the Internet. In this situation, the User-Agent is not suspect, but in others, using an old version of User-Agent could be correlated to a malicious activity.&lt;/p&gt;

&lt;p&gt;In simpler words, the&lt;br&gt;
Source (&lt;strong&gt;EliotPRD&lt;/strong&gt;) asked the browser (&lt;strong&gt;Mozilla Firefox&lt;/strong&gt;)&lt;br&gt;&lt;br&gt;
 to go to the Destination (&lt;strong&gt;hxxps[://]letsdefend[.]io/blog/?s=skills&lt;/strong&gt;) and fetch the "Skills" section. &lt;/p&gt;

&lt;p&gt;Considering the hostname &lt;strong&gt;EliotPRD&lt;/strong&gt;, this endpoint is a machine used in production environment. It is the live environment where the software is deployed for end-users.&lt;/p&gt;

&lt;p&gt;Collecting data about the endpoint device implied in this event, we discover the following:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;it's a client (not a server)&lt;/li&gt;
&lt;li&gt;uses Ubuntu 16.04.4&lt;/li&gt;
&lt;li&gt;it's on letsdefend.local domain&lt;/li&gt;
&lt;li&gt;primary user: eliot&lt;/li&gt;
&lt;li&gt;last login: Feb, 27, 2022, 12:00 AM&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fr1s4r25xz6zhwfmbods8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fr1s4r25xz6zhwfmbods8.png" alt="endpoint" width="800" height="407"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;There is no process running.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5eyn9r9bl4wds5y6puuo.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5eyn9r9bl4wds5y6puuo.png" alt="process" width="800" height="390"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The established connections are to a single IP address.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1ixndgbx3wz8oya3xfo1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1ixndgbx3wz8oya3xfo1.png" alt="network" width="800" height="383"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;There was used a command &lt;code&gt;date&lt;/code&gt; on 27th of February 01:11 AM. This command is used to display the system date and time.&lt;/p&gt;

&lt;p&gt;And we discover the following URLs accessed:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fo8cp8eqhp36dmd1mwk4n.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fo8cp8eqhp36dmd1mwk4n.png" alt="URL" width="800" height="396"&gt;&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;We can correlate the URLs discovered in the &lt;em&gt;Browser History&lt;/em&gt; with the IPs from &lt;em&gt;Network Action&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;Did you see that? At 27.02.2022 00:36,&lt;br&gt;
hxxps[://]letsdefend[.]io/blog/?s=skills (IP: 188.114.96.15) was accessed!&lt;/p&gt;

&lt;p&gt;So now that we gathered the evidence we can surely confirm it is an outbound connection (internal to external).&lt;/p&gt;

&lt;p&gt;Now, let's gather data about 188.114.96.15.&lt;/p&gt;

&lt;p&gt;As VirusTotal reveals, no AV vendor detected it as malicious.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhwchv9ocopb1wc8xqdsr.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhwchv9ocopb1wc8xqdsr.png" alt="VT" width="800" height="132"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;But it there are 9 detected files communicating with the IP address, and there is a comprehensive list of graph containing. I will list here only those associated prior to the event: &lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftkbqiw299kcmk586frac.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftkbqiw299kcmk586frac.png" alt="graph" width="800" height="98"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We also check AbuseipDB and find the following (please note that the searches are done at the moment of writing this article, which is ~3 years after the event 😉).&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F735no5fwihm2cr9pthqz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F735no5fwihm2cr9pthqz.png" alt="abuseip" width="800" height="1058"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The IP is static, owned by Cloudflare, which is not primarily a web hosting provider.&lt;br&gt;
The IP reputation is &lt;strong&gt;neutral&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsbfk6vetmj9c8yneo7vw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsbfk6vetmj9c8yneo7vw.png" alt="http" width="800" height="571"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Further into our analysis, let's examine the HTTP traffic by checking the logs in Log Management section.&lt;/p&gt;

&lt;p&gt;It can be observed the date, the type of log (proxy), the source address (172.16.17.46), the source port (46843), the destination address (188.114.96.15) and the destination port (443). &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fb0w123jxcjzaqf165y4l.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fb0w123jxcjzaqf165y4l.png" alt="differentrequests" width="800" height="425"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;It can be also noticed that there is a total of 7 HTTP requests.&lt;/p&gt;

&lt;p&gt;We can take each log and analyze the connections (example in the screenshot below):&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpx07wuqrlekyyo89dwdr.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpx07wuqrlekyyo89dwdr.png" alt="am" width="800" height="233"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;It can be safely confirmed there is no malicious traffic between the source and the destination.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa08121tgqjmeojbt2u88.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa08121tgqjmeojbt2u88.png" alt="nonmalicious2" width="800" height="374"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Therefore, the alarm is &lt;strong&gt;False Positive&lt;/strong&gt;. It was triggered by the presence of "ls" in the word "skills".  &lt;/p&gt;




&lt;p&gt;What are your thoughts? 😉&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>writing</category>
    </item>
    <item>
      <title>Playing with CSV and PowerShell | Switch between columns</title>
      <dc:creator>a.infosecflavour</dc:creator>
      <pubDate>Mon, 23 Jun 2025 22:24:00 +0000</pubDate>
      <link>https://forem.com/yowise/playing-with-csv-and-powershell-switch-between-columns-326i</link>
      <guid>https://forem.com/yowise/playing-with-csv-and-powershell-switch-between-columns-326i</guid>
      <description>&lt;p&gt;Hello everyone 🤗&lt;/p&gt;

&lt;p&gt;PowerShell mode: ON ✅&lt;/p&gt;

&lt;p&gt;If you ever wondered how you can switch between two columns WITHOUT using Excel to do the actions, here you find the answer!&lt;/p&gt;

&lt;p&gt;Else if you never wondered...well, stay here because you'll learn something valuable!&lt;/p&gt;

&lt;p&gt;Else if you already know...is it the same method? 😏&lt;/p&gt;

&lt;p&gt;Else...I'll still advise you to read the whole article! 😉&lt;/p&gt;

&lt;h2&gt;
  
  
  Case
&lt;/h2&gt;

&lt;p&gt;In this article, you'll recognize the same file as used in &lt;a href="https://dev.tourl"&gt;Why is my CSV file messed up?&lt;/a&gt;.&lt;br&gt;
What if we want to switch between column A (called Date and Time) and column B (called Dividend). We can do this using the power of...PowerShell!&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;

$inputFilePath = "C:\path\KO_stock_dividend (1).csv"


$fileContent = Get-Content -Path $inputFilePath


$fileData = $fileContent | ConvertFrom-Csv


$swappedData = $fileData | ForEach-Object {
    $temp = $_."Date and Time"
    $_."Date and Time" = $_."Dividend"
    $_."Dividend" = $temp
    $_
}


$swappedCsv = $swappedData | ConvertTo-Csv -NoTypeInformation


$swappedCsv[0] = $swappedCsv[0] -replace 'Date and Time', 'tempHeader'
$swappedCsv[0] = $swappedCsv[0] -replace 'Dividend', 'Date and Time'
$swappedCsv[0] = $swappedCsv[0] -replace 'tempHeader', 'Dividend'


$swappedCsv | Set-Content -Path $inputFilePath

Write-Output "Columns and values swapped, and file saved to $inputFilePath"

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;And this is the output:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1zdho1n43ihkilgs0jwa.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1zdho1n43ihkilgs0jwa.png" alt="output" width="750" height="982"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;➡️➡️➡️Pseudocode⬅️⬅️⬅️&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;1. Set inputFilePath to the path of the CSV file.
2. Read fileContent from the CSV file at inputFilePath.
3. Convert fileContent to structured data (fileData).
4. For each row in fileData:
    a. Store "Date and Time" value in a temporary variable (temp).
    b. Assign "Dividend" value to "Date and Time".
    c. Assign temp value to "Dividend".
    d. Return the modified row.
5. Convert swappedData to CSV format (swappedCsv) without type information.
6. Replace "Date and Time" with a temporary header name.
7. Replace "Dividend" with "Date and Time".
8. Replace temporary header name with "Dividend".
9. Save swappedCsv back to the CSV file at inputFilePath.
10. Output "Columns and values swapped, and file saved to inputFilePath".
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;You probably noticed that the file will be over-written. The code can be modified so the integrity of the original file is kept.&lt;br&gt;
Option A) Make sure you back-up your file before executing the script&lt;/p&gt;

&lt;p&gt;Option B) Use PowerShell 👓&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;
$inputFilePath = "C:\path\KO_stock_dividend (1).csv"
$outputFilePath = "C:\path\KO_stock_dividend_(1)_modified.csv"


$fileContent = Get-Content -Path $inputFilePath


$fileData = $fileContent | ConvertFrom-Csv


$swappedData = $fileData | ForEach-Object {
    $temp = $_."Date and Time"
    $_."Date and Time" = $_."Dividend"
    $_."Dividend" = $temp
    $_
}


$swappedCsv = $swappedData | ConvertTo-Csv -NoTypeInformation


$swappedCsv[0] = $swappedCsv[0] -replace 'Date and Time', 'tempHeader'
$swappedCsv[0] = $swappedCsv[0] -replace 'Dividend', 'Date and Time'
$swappedCsv[0] = $swappedCsv[0] -replace 'tempHeader', 'Dividend'


$swappedCsv | Set-Content -Path $outputFilePath

Write-Output "Columns and values swapped, and file saved to $outputFilePath"

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;And that's it!&lt;/p&gt;

&lt;p&gt;Now you know how to switch/ swap two columns.&lt;/p&gt;




&lt;p&gt;Note: Make sure to replace the path with the one you actually use. Perhaps your file is under "C:\Users\user1\Documents\Reports". &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcj4roawummc45ccbzj6t.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcj4roawummc45ccbzj6t.gif" alt="spreadsheet" width="498" height="373"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>csv</category>
      <category>beginners</category>
      <category>powershell</category>
      <category>writing</category>
    </item>
    <item>
      <title>Why is my CSV file messed up?</title>
      <dc:creator>a.infosecflavour</dc:creator>
      <pubDate>Mon, 23 Jun 2025 18:22:40 +0000</pubDate>
      <link>https://forem.com/yowise/why-is-my-csv-file-messed-up-gge</link>
      <guid>https://forem.com/yowise/why-is-my-csv-file-messed-up-gge</guid>
      <description>&lt;p&gt;Hello 👋&lt;/p&gt;

&lt;p&gt;Say you download a CSV file and your data is not formatted in a readable manner.&lt;/p&gt;

&lt;p&gt;It can be frustrating, especially when it you need to execute the same steps all over again. Data that must be on separate columns shares the same space... And in certain cases, the data format is compromised and you need to employ other methods to obtain the desired result.&lt;/p&gt;

&lt;p&gt;I've been there. The time I spent brushing up the file could have been used in other ways. 🕛🔵🕧&lt;/p&gt;

&lt;p&gt;Until one day when I discovered that Excel actually has a plenty of configurable options! 😀&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1rj0rua1t6oxb0uyvez3.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1rj0rua1t6oxb0uyvez3.gif" alt="mario" width="498" height="373"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In your wonderful Excel file, go to &lt;br&gt;
File-&amp;gt; Options-&amp;gt; Advanced and make sure the box next to the Use system separators option is unticked, just like in the image below:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcwmbsjf8fg77k8h3vqxg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcwmbsjf8fg77k8h3vqxg.png" alt="advanced options" width="800" height="654"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Let's see an actual example:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;BEFORE&lt;/strong&gt; (i.e box ticked)&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3uldbwrfywnesx12q5p4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3uldbwrfywnesx12q5p4.png" alt="before" width="800" height="563"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;AFTER&lt;/strong&gt; (i.e box unticked)&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fks17ifqyd61hb70ozz5l.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fks17ifqyd61hb70ozz5l.png" alt="after" width="800" height="566"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;‼️After you applied the settings, the effect applies to the next CSV file created/ downloaded.&lt;/p&gt;

&lt;p&gt;Almost forgot! Be sure that the Regional Settings have the format below:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3no8yohv35pm69sm1dpx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3no8yohv35pm69sm1dpx.png" alt="format" width="649" height="922"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Of course, this shouldn't affect your applications/ products- so take this into consideration. &lt;/p&gt;

&lt;p&gt;And one last thing: make sure you save someone by sharing this article with them. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0aqvadoiz1l0dw4yqzuz.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0aqvadoiz1l0dw4yqzuz.gif" alt="MS Excel" width="400" height="300"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;p&gt;Do you know another method? Let me know in the comments!&lt;/p&gt;

</description>
      <category>beginners</category>
      <category>csv</category>
      <category>writing</category>
      <category>data</category>
    </item>
    <item>
      <title>LetsDefend.io | SOC202- FakeGPT Malicious Chrome Extension</title>
      <dc:creator>a.infosecflavour</dc:creator>
      <pubDate>Sun, 22 Jun 2025 22:26:45 +0000</pubDate>
      <link>https://forem.com/yowise/letsdefendio-soc202-fakegpt-malicious-chrome-extension-nj0</link>
      <guid>https://forem.com/yowise/letsdefendio-soc202-fakegpt-malicious-chrome-extension-nj0</guid>
      <description>&lt;p&gt;Hello 👋&lt;/p&gt;

&lt;p&gt;Let's have a taste of LetsDefend.io challenges. Today we're studying SOC202- FakeGPT Malicious Chrome Extension. 🕵️&lt;/p&gt;

&lt;p&gt;As it can be deducted from the alert, here are details about the event:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Severity =&amp;gt; High&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Date =&amp;gt; May, 29, 2023, 01:01 PM&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Rule name =&amp;gt;  SOC202 - FakeGPT Malicious Chrome Extension&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;EventID =&amp;gt; 153&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Type =&amp;gt; Data Leakage&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Hostname =&amp;gt; Samuel&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;IP =&amp;gt; &lt;code&gt;172[.]16[.]17[.]173&lt;/code&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;File name =&amp;gt; &lt;code&gt;hacfaophiklaeolhnmckojjjjbnappen.crx&lt;/code&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;File path =&amp;gt; &lt;br&gt;
&lt;code&gt;C:\Users\LetsDefend\Download\hacfaophiklaeolhnmckojjjjbnappen.crx&lt;/code&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;File hash =&amp;gt; &lt;br&gt;
&lt;code&gt;7421f9abe5e618a0d517861f4709df53292a5f137053a227bfb4eb8e152a4669&lt;/code&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Command executed =&amp;gt; &lt;br&gt;
&lt;code&gt;chrome.exe --single-argument C:\Users\LetsDefend\Download\hacfaophiklaeolhnmckojjjjbnappen.crx&lt;/code&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Device action =&amp;gt; allowed&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fitr4wde841hzqe73lowh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fitr4wde841hzqe73lowh.png" alt="extensions" width="800" height="272"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We need to check:&lt;br&gt;
-&amp;gt; the reputation of the file hash&lt;br&gt;
-&amp;gt; suspicious processes&lt;br&gt;
-&amp;gt; commands executed&lt;br&gt;
-&amp;gt; network connections&lt;br&gt;
-&amp;gt; browser history&lt;br&gt;
-&amp;gt; log entries indicating C2 communication&lt;/p&gt;

&lt;p&gt;If we confirm the alert is true positive, then the endpoint will be immediately contained. Also, this means the event resulted into an incident.  &lt;/p&gt;

&lt;h2&gt;
  
  
  Investigation
&lt;/h2&gt;

&lt;p&gt;As it can be observed in the alarm details, the endpoint's hostname is &lt;strong&gt;Samuel&lt;/strong&gt;. The IP address is &lt;code&gt;172[.]16[.]17[.]173&lt;/code&gt;. The execution was allowed, which means the &lt;code&gt;.crx&lt;/code&gt; file was not quarantined. I proceed with checking the reputation of the given hash and then start looking for evidence of execution.&lt;/p&gt;

&lt;h3&gt;
  
  
  File hash check
&lt;/h3&gt;

&lt;p&gt;According to VirusTotal, the hash is not flagged by any of the AV vendors.&lt;br&gt;
However, the community score is negative 5. This represents an evidence which suggests the file is malicious.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmtx7qx32ld0hhfbk6hu7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmtx7qx32ld0hhfbk6hu7.png" alt="VirusTotal" width="800" height="135"&gt;&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;
  
  
  Suspicious processes
&lt;/h3&gt;

&lt;p&gt;The alarm was triggered on 29th of May 2023, at 01:01 PM. I am looking for processes running around the indicated time.&lt;/p&gt;

&lt;p&gt;These are all the processes running before, during and after the event:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fx9jbk1wxt8cpe8c2thig.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fx9jbk1wxt8cpe8c2thig.png" alt="processes_running" width="800" height="431"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;One of particular interest is &lt;code&gt;chrome.exe&lt;/code&gt;.&lt;br&gt;
ProcessID is &lt;strong&gt;5756&lt;/strong&gt;. Its parent process is OpenWith.exe, whose ProcessID is &lt;strong&gt;7074&lt;/strong&gt; which in turn was executed using &lt;code&gt;explorer.exe&lt;/code&gt; (ParentProcess). The fact that it was executed with explorer.exe means it's an action performed by the user.&lt;/p&gt;

&lt;p&gt;I researched about &lt;code&gt;OpenWith.exe&lt;/code&gt; and discovered it's a legitimate executable, invoked when a user tries to open a file with an extension which is not linked to a specific program. Also known as &lt;code&gt;Pick an App&lt;/code&gt;, it typically runs from &lt;code&gt;%windir%\System32\OpenWith.exe&lt;/code&gt; (&lt;a href="https://medium.com/@boutnaru/the-windows-process-journey-openwith-exe-pick-an-app-7bf3a3349a38" rel="noopener noreferrer"&gt;source: Medium&lt;/a&gt;).&lt;br&gt;
Malicious actors often rely on masquerading to evade detection, so checking the name alone is not enough. We need to see where it runs from and look for suspicious commands. Based on the process details, the process is indeed legitimate, because it ran from its usual location.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpgqwdqv1rdk3ozaccbm9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpgqwdqv1rdk3ozaccbm9.png" alt="openwith" width="800" height="178"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Moving to &lt;code&gt;chrome.exe&lt;/code&gt;, it also ran from its legitimate location: &lt;code&gt;C:\Program Files\Google\Chrome\Application\chrome.exe"&lt;/code&gt;. The command line indicates a chrome extension as being run from the user's desktop: &lt;code&gt;-- single-argument&lt;br&gt;
C:\Users\LetsDefend\Desktop\hacfaophiklaeolhnmckojjjjbnappen.crx&lt;/code&gt;. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F78k7jb9seg0u74w44dg9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F78k7jb9seg0u74w44dg9.png" alt="processes" width="800" height="243"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsyn488emcyrt68gh99ns.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsyn488emcyrt68gh99ns.png" alt="suspicious_process" width="800" height="202"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Network action
&lt;/h3&gt;

&lt;p&gt;After the extension execution, the endpoint communicated with 3 IPs:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;52[.]76[.]101[.]124&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;18[.]140[.]6[.]45&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;172[.]217[.]17[.]142&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffq242xv3xq6r1566pfp5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffq242xv3xq6r1566pfp5.png" alt="network" width="800" height="357"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I conducted a research on VirusTotal and discovered the IP was not flagged as malicious by any of the vendor. Checked the Community tab and found references to scam entities.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1eevj55uy41fpy09p6y2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1eevj55uy41fpy09p6y2.png" alt="IPCommunity" width="800" height="308"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Looked also on AbuseIPDB and discovered the IP was not found in any database.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmkliszte8mu41p5z0yi9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmkliszte8mu41p5z0yi9.png" alt="database" width="800" height="489"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The hostname indicates it's an Amazon EC2 (Elastic Cloud Compute) instance, a virtual machine running on Amazon. The associatedregion is Singapore.&lt;/p&gt;

&lt;p&gt;Checked the next IP. Virus Total doesn't indicate any vendor which flags the IP as malicious. However, the Community tab indicates the same scam references.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frw1yut0dcflnn5ps7h6z.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frw1yut0dcflnn5ps7h6z.png" alt="community" width="800" height="314"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The IP was not found on AbuseIPDB. It is another EC2 instance running in Singapore.&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpstzu5u3jbccg3kgvso7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpstzu5u3jbccg3kgvso7.png" alt="abuseipd" width="800" height="479"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;So far, it's discovered the endpoint communicated after the event with two EC2 instances located in Singapore. While no entry indicates these are suspicious, the community details point them as being a scam.&lt;/p&gt;

&lt;p&gt;Verified the reputation of the 3rd listed IP. No AV vendor flags it as malicious. The Community tab contains references as being associated to malicious activities.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9smqfuglpnd0vrkq6lor.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9smqfuglpnd0vrkq6lor.png" alt="IP3" width="800" height="167"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Checked it on AbuseIPDB and found it was reported 10 times. It is mostly associated with Probe Scanning activities. Also used in DDOS attacks.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F886jevcahi2cheipnolw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F886jevcahi2cheipnolw.png" alt="abuseipdb10" width="800" height="530"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fm6ydqpz2dt3rfto9pbyi.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fm6ydqpz2dt3rfto9pbyi.png" alt="community" width="800" height="570"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Browser history
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbc3ps26hoe8phu008dgm.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbc3ps26hoe8phu008dgm.png" alt="browser" width="800" height="397"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;According to the browser history, the user triggered the download of the extension at 13:01:44. The warnings were ignored. At 13:02:01, the extension was opened. The use accessed &lt;code&gt;hxxps[://]chat[.]openai[.]com&lt;/code&gt; which is a legitimate activity. After that, most likely, the purpose of authenticating into OpenAI was to establish the link with the malicious extension.&lt;/p&gt;

&lt;h2&gt;
  
  
  Log investigation
&lt;/h2&gt;

&lt;p&gt;Checking the log entries associated with the affected IP indicate  various outbound and inbound connections are discovered:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3bqgfda1nxgjqkddswyg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3bqgfda1nxgjqkddswyg.png" alt="source" width="800" height="254"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;It can be observed the endpoint established a connection with &lt;code&gt;version[.]chatgpt4google[.]workers[.]dev&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;It is flagged as malicious by 3/94 vendors. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi6gdsesf4p06obnf3eu7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi6gdsesf4p06obnf3eu7.png" alt="entries" width="800" height="497"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpgdesu2ghbf0argxqmru.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpgdesu2ghbf0argxqmru.png" alt="dev" width="800" height="183"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Next check indicates another suspicious destination host (&lt;code&gt;www[.]chatgptforgoogle[.]pro&lt;/code&gt;) &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F238d3ujom1aqnj23vhsp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F238d3ujom1aqnj23vhsp.png" alt="host1" width="800" height="435"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;It is flagged as malicious by 3/94 AV vendors, with a community score of -1. &lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjvpuz6kmpcdvtdb7y2u4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjvpuz6kmpcdvtdb7y2u4.png" alt="VT" width="800" height="300"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Another proxy log entry indicates a connection to &lt;code&gt;www[.]chatgptgoogle[.]org&lt;/code&gt;. A check on Virus Total indicates it's been flagged by 10/94 AV vendors. Also, the community entry relates to same info found earlier when investigating the IP in Virus Total.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9ntiu2n6xjnuwtwhirvs.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9ntiu2n6xjnuwtwhirvs.png" alt="next_log" width="800" height="423"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdr5yl12qph49z9egu7pl.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdr5yl12qph49z9egu7pl.png" alt="VirusTotal_result" width="800" height="270"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The final IP points to a connection to &lt;code&gt;chrome[.]google[.]com&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fltmmbnreko49jpocdyut.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fltmmbnreko49jpocdyut.png" alt="raw_log" width="800" height="396"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;It can be noticed that all the connections to the external IPs were established through port 80, corresponding to protocol HTTP, which is insecure.&lt;/p&gt;

&lt;p&gt;Based on the findings associated to the mentioned IP, the endpoint established  communications with C2 infrastructure. &lt;/p&gt;

&lt;h3&gt;
  
  
  Containment
&lt;/h3&gt;

&lt;p&gt;The endpoint is immediately contained.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fipmsf4ndfcdderz1oioy.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fipmsf4ndfcdderz1oioy.png" alt="containment_q" width="800" height="332"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Endpoint contained:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fq4wtehhpnji8xafxjwef.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fq4wtehhpnji8xafxjwef.png" alt="endpoint_c" width="800" height="312"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Indicators of Compromise:
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;SHA-256 hash:
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;7421f9abe5e618a0d517861f4709df53292a5f137053a227bfb4eb8e152a4669
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ul&gt;
&lt;li&gt;Malicious IPs:
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;52[.]76[.]101[.]124
18[.]140[.]6[.]45
172[.]217[.]17[.]142
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ul&gt;
&lt;li&gt;Malicious domains:
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;www[.]chatgptgoogle[.]org
www[.]chatgptforgoogle[.]pro
version[.]chatgpt4google[.]workers[.]dev
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ul&gt;
&lt;li&gt;Malicious URL:
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;hxxps[://]chrome[.]google[.]com/webstore/detail/chatgpt-for-google/hacfaophiklaeolhn
mckojjjjbnappen
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Recommendations
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Remove the malicious extension&lt;/li&gt;
&lt;li&gt;Re-image the affected endpoint&lt;/li&gt;
&lt;li&gt;Check for the organizational widespread&lt;/li&gt;
&lt;li&gt;Provide training to the affected user in relation to the usage of external software&lt;/li&gt;
&lt;li&gt;Establish technical controls to prohibit the usage of un-approved browser extensions&lt;/li&gt;
&lt;li&gt;Blacklist the malicious IPs, domains and URL&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>cybersecurity</category>
      <category>writing</category>
      <category>community</category>
    </item>
    <item>
      <title>Splunk Boss of the SOC- Corelight trickbot ctf</title>
      <dc:creator>a.infosecflavour</dc:creator>
      <pubDate>Fri, 28 Feb 2025 20:25:53 +0000</pubDate>
      <link>https://forem.com/yowise/splunk-boss-of-the-soc-corelight-trickbot-ctf-1bj</link>
      <guid>https://forem.com/yowise/splunk-boss-of-the-soc-corelight-trickbot-ctf-1bj</guid>
      <description>&lt;p&gt;Hello everyone! It's been a while since I last posted but you know it's better later than never. 😏&lt;/p&gt;

&lt;p&gt;During this time, I came across the following challenge: Corelight trickbot ctf.&lt;/p&gt;

&lt;p&gt;It is available on &lt;a href="https://bots.splunk.com/login?redirect=/" rel="noopener noreferrer"&gt;BOSS of the SOC&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Spoiler alert ➡️You need to create an account first. You'll then discover more "games" and learning rooms. I was grateful when I discovered this site, because it teaches you how to use Splunk SIEM in a more advanced way. It's totally worth it! &lt;/p&gt;

&lt;p&gt;Now let's dive into Corelight Partner Experience! 😎&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;101. How many total Suricata alerts were generated in this index?&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;index="corelight" sourcetype=* "suricata"
| dedup sourcetype
| table sourcetype
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;index="corelight"sourcetype="corelight_suricata_corelight"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;code&gt;47&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;102. Most of the alerts are being generated by a single source host. What is its IP address?&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;index="corelight" sourcetype="corelight_suricata_corelight"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;code&gt;10.0.0.31&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;103. What's the name of the malware family identified by these alerts?&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;index="corelight" sourcetype="corelight_suricata_corelight" alert.signature="ET MALWARE Win32/Trickbot Data Exfiltration"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;code&gt;trickbot&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://malpedia.caad.fkie.fraunhofer.de/library" rel="noopener noreferrer"&gt;malware family source&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;104. Let's take a closer look at the "ET MALWARE Win32/Trickbot Data Exfiltration" alerts. You'll notice that three of the alerts share a single UID, meaning they all occured on a single TCP stream. What is that UID?&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;index="corelight"  sourcetype="corelight_suricata_corelight" "Win32/Trickbot Data Exfiltration"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;code&gt;CAoNRI62m9CRqS0R2&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Note: The &lt;strong&gt;UID&lt;/strong&gt; (Unique Identifier) in this context is used to uniquely identify a specific &lt;strong&gt;TCP stream&lt;/strong&gt; or &lt;strong&gt;connection&lt;/strong&gt;. When multiple alerts share the same UID, it means they are part of the same network communication session. This can be useful for correlating related events and understanding the full scope of an attack or suspicious activity.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;105. What is the IP address of the malicious server involved in the alerts for this stream?&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;index="corelight" sourcetype="corelight_suricata_corelight" "alert.signature"="ET MALWARE Win32/Trickbot Data Exfiltration" uid=CAoNRI62m9CRqS0R2 | table src, dest
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Exfiltration activity= destination&lt;br&gt;
&lt;code&gt;103.16.104.83&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;106. What layer 7 protocol is the traffic in the previous question flowing over that generates the alerts?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Layer 7 protocol = Application&lt;/p&gt;

&lt;p&gt;Therefore, the field &lt;strong&gt;app&lt;/strong&gt; comes handy.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnuqr3gwwpvyfk7vql35k.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnuqr3gwwpvyfk7vql35k.png" alt="http" width="800" height="561"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://docs.splunk.com/Documentation/CIM/4.13.0/User/Authentication" rel="noopener noreferrer"&gt;Splunk documentation&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;That's intended to be the application involved in the event. For example, a user attempting to login to an SSH service would be an example of an authentication event, and the "app" would be "SSH" or "SSHD" or something along those lines.&lt;/p&gt;

&lt;p&gt;The answer is &lt;code&gt;http&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;107. Taking the UID mentioned in the previous question and searching for it across the index, we see that a &lt;em&gt;corelight_notice&lt;/em&gt; log was also generated. What is the number of the MITRE ATT&amp;amp;CK TTP referenced in the notice?&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;index="corelight" CAoNRI62m9CRqS0R2 sourcetype=corelight_notice
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffaoo46o6xd5d5wrkxr0p.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffaoo46o6xd5d5wrkxr0p.png" alt="splunk" width="800" height="386"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;S0266&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;108. What User-Agent string was sent as part of the Trickbot HTTP requests?&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;index="corelight" uid=CAoNRI62m9CRqS0R2 sourcetype=corelight_http | table http_user_agent

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsnepb724ttiw65qsgmav.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsnepb724ttiw65qsgmav.png" alt="http_user_agent" width="800" height="281"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Ghost&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;109. What is a process name that is repeated within the POST body of these HTTP requests?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;svchost.exe&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Few things about svchost.exe:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Image Path will always be: %SystemRoot%\system32\svchost.exe &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Parent process: services.exe&lt;br&gt;
Number of instances: many (generally at least &lt;strong&gt;10&lt;/strong&gt;, and often more than &lt;strong&gt;50&lt;/strong&gt;)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Runs with the -k parameter to differentiate/services&lt;/strong&gt; =&amp;gt; the absence of this parameter is a strong indication that something is off.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;It's used to run service DLLs.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Pay attention to name misspells. &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;110. Let's look at what happened after the malware was dropped. Looking at Suricata alerts following the Trickbot alert, a popular scanning tool appears to have been used for reconnaissance. What is the name of that tool?&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;index="corelight" sourcetype="corelight_suricata_corelight" | stats values(alert.signature)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;code&gt;nessus&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpv2oetz1of54bn2secjx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpv2oetz1of54bn2secjx.png" alt="nessus" width="800" height="770"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;111. One of the alerts generated by our infected host could result in command execution on a wireless access point. Looking at the response from the remote system, however, it's pretty clear that the attack failed. How many bytes did the target send back to the attacker on this connection?&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;index="corelight" sourcetype="corelight_suricata_corelight" | stats values(alert.signature)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;index="corelight" sourcetype="corelight_suricata_corelight" "ETPRO Exploit Possible Asus WRT LAN Backdoor Command Execution"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;index="corelight" ChGTlJ1zd2PRktosx5 sourcetype=corelight_conn
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;code&gt;0&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;112. Looking at the layer 7 services used by the infected host after the Trickbot alerts above, we see an SSH connection made to an internal host. What is the IP address of that host?&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;index="corelight" src=10.0.0.31 sourcetype=corelight_ssh auth_success=true | table dest
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;code&gt;10.0.0.72&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;113. What is the PCR (producer/consumer ratio) of that SSH session?&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;index="corelight" CLn5mqsd7SVfTn10g sourcetype=corelight_conn
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;`-0.9959339475461754`
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhy9quhjxj1vujjjkxgz8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhy9quhjxj1vujjjkxgz8.png" alt="pcr" width="800" height="596"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;The Producer-Consumer Ratio (PCR)&lt;br&gt;
measures the “shape” of a system’s pattern&lt;br&gt;
of network use. Significant shifts in PCR&lt;br&gt;
may indicate unusual data movement&lt;br&gt;
(staging or exfil).&lt;/em&gt; (&lt;a href="https://infocondb.org/con/black-hat/black-hat-usa-2017/go-to-hunt-then-sleep" rel="noopener noreferrer"&gt;source&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;114. Examining the inferences section of the SSH log associated with that session, one code indicates a behavior that explains the PCR we just observed. Which code is it?&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;index="corelight" CLn5mqsd7SVfTn10g sourcetype=corelight_ssh
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;code&gt;LFD&lt;/code&gt;&lt;br&gt;
LFD stands for Login Failure Daemon.&lt;br&gt;
&lt;em&gt;Login Failure Daemon is a continuously running process that runs all the time (Every Second) and scans all the login attempts against your server using log file entries and blocks all the entries that fail within a short period of time. These types of attacks are also known as “Brute-Force Attacks“. The Daemon process runs every second and responds very quickly to these patterns and blocks all the offending IPs quickly.&lt;/em&gt; (&lt;a href="https://blog.redserverhost.com/how-to-disable-all-cpanel-lfd-login-failure-daemon-alerts" rel="noopener noreferrer"&gt;source&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyshktkuik0tfoib0a5ig.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyshktkuik0tfoib0a5ig.png" alt="inferences_name" width="800" height="918"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxhcahrsfgi1ddybrlqos.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxhcahrsfgi1ddybrlqos.png" alt="inferences" width="800" height="699"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;115. The owner of the infected workstation had no credentials to log into 10.0.0.72 over SSH. However, there was another connection between those hosts over HTTP. What attack type was sent over that connection?&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;index="corelight" src=10.0.0.31 dest=10.0.0.72 sourcetype=corelight_http | table uri
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fg8zug7ify5ktejgwvpxb.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fg8zug7ify5ktejgwvpxb.png" alt="uri" width="800" height="509"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;(&lt;a href="https://www.camentasystems.com/index.php/resources/blog-article/web-application-attacks-via-url-and-uri-manipulation-bypassing-security-systems" rel="noopener noreferrer"&gt;source&lt;/a&gt;)&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;index="corelight" src=10.0.0.31 dest=10.0.0.72 sourcetype=corelight_http
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;code&gt;SQL Injection&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;116. What parameter of the index.php script did the infected system attempt to use for SQL injection?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;username&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;117. What was the HTTP status code from the targeted server?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;200&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;118. Did this SQL injection attack generate any Suricata alerts? (Yes/No)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;No&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;119. Returning to SSH connections made by our infected host, we see a second one being made to a country the organization has no business relationship with. What country is that connection going to?&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;index="corelight" src=10.0.0.31 sourcetype=corelight_ssh auth_success=true
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6gkqnrf6p4dsnu10j8dc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6gkqnrf6p4dsnu10j8dc.png" alt="th" width="800" height="389"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Thailand&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;120. Judging by the PCR (producer/consumer ratio) of this connection, data was definitely exfiltrated to this external system. What is the SSH host key of that system?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;1c:6e:58:a2:57:98:33:f4:53:e8:63:46:df:a2:31:ef&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;121. How many payload bytes were sent over that connection?&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;index="corelight" CPxHxI3uiHLgH2I196 sourcetype=corelight_conn
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fti0qwzpmkgee79q7cika.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fti0qwzpmkgee79q7cika.png" alt="bytes_out" width="800" height="771"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;128105745&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;122. The challenge author's favorite SSL certificate organization name - a default out of many certificate generation tools - is present in this index, highlighted by a Suricata alert. What is that organization name?&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;index="corelight" sourcetype="corelight_suricata_corelight"  | stats values(alert.signature)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;code&gt;Internet Widgits Pty Ltd&lt;/code&gt;&lt;/p&gt;




&lt;p&gt;What are your thoughts? 😇&lt;br&gt;
What do you say, will you give it a shot and be Boss of the SOC? 😎&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>writing</category>
    </item>
  </channel>
</rss>
