Tailgating vs. Piggybacking: Understanding the Difference

In the realm of physical security, “tailgating” and “piggybacking” are two common methods used to gain unauthorized access to restricted areas. While both involve an unauthorized individual entering a secure area, there is a key distinction between the two. Tailgating: Sneaking in unnoticed Tailgating occurs when an unauthorized person closely follows an authorized person through a security door or gate without their knowledge or consent. The unauthorized individual relies on the authorized person to activate the access control system, slipping in behind them before the door or gate closes. ...

December 1, 2024 · 2 min · 365 words · 0xuki

Rootkits: The Hidden Threat

Rootkits: The Hidden Threat Rootkits are a set of tools and software used to maintain hidden access to a computer system after it has been compromised. They are designed to be stealthy and difficult to detect, making them a significant security threat. Here are the main types of rootkits: 1. Hypervisor Level Rootkits How they work: These rootkits exploit hardware virtualization technology to install themselves between the hardware and the operating system kernel. They essentially act as a virtual machine monitor, intercepting communication and requests between the hardware and the host OS. Why they’re dangerous: Since the kernel runs on top of the rootkit, it has no way of knowing that the underlying hardware has been compromised. This makes traditional detection methods, which operate at the user or kernel level, ineffective. 2. Kernel Level Rootkits How they work: The kernel is the core of an operating system. These rootkits modify the kernel by adding code through device drivers (in Windows) or loadable kernel modules (in Linux). They can also replace parts of the core operating system code with modified versions. Why they’re dangerous: Kernel level rootkits operate with the same privileges as the operating system, allowing them to intercept or disrupt any operation. This makes them very difficult to detect. Additionally, bugs in the rootkit code can severely impact system stability. 3. Application Rootkits How they work: These are the simplest type of rootkit and run in user mode. They modify existing applications or processes to hide their presence or the presence of other malicious activities. They can alter processes, network connections, files, events, and system services. Why they’re less dangerous: This is the only type of rootkit that can be reliably detected by common antivirus applications. In summary: Rootkits pose a serious threat to computer security due to their stealthy nature. Understanding the different types of rootkits and how they operate is crucial for effective defense against these threats. ...

October 3, 2024 · 2 min · 320 words · 0xuki

HTTP Request Smuggling (HRS)

Understanding HTTP Request Smuggling: A Deep Dive into Web Security In the dynamic world of web security, new threats and vulnerabilities continuously emerge, challenging the robustness of our digital infrastructures. Among these, HTTP request smuggling stands out as a complex yet intriguing exploit that targets the very foundations of how the web operates. This blog post aims to unravel the complexities of HTTP request smuggling, exploring its mechanisms, potential impacts, and effective countermeasures to safeguard against this sophisticated cyber threat. ...

April 20, 2024 · 3 min · 597 words · 0xuki

Cross-Origin Resource Sharing (CORS)

Understanding Cross-Origin Resource Sharing (CORS): A Beginner’s Guide In the world of web development, security is paramount. One crucial aspect of securing web applications is understanding how to manage Cross-Origin Resource Sharing, commonly known as CORS. This concept can be a bit daunting for beginners, so in this blog post, we’ll break down CORS in a way that’s easy to understand and implement. What is CORS? CORS is a security feature implemented by web browsers to prevent malicious websites from accessing resources from another domain without permission. Essentially, it allows web servers to define who can access their resources and how. It’s a policy used to relax the same-origin policy, which is a security measure that restricts how a document or script from one origin can interact with resources from another origin. ...

April 13, 2024 · 3 min · 597 words · 0xuki

Understanding Idle Scan: Mechanism and Characteristics

Idle Scan is an advanced TCP port scanning technique. In this method, an attacker uses a “zombie” computer (a machine in an idle state) to perform port scanning on target systems. 🎯 Basic Concepts Idle Scan is based on three important facts: TCP Port State Verification Open port → Responds with SYN/ACK packet Closed port → Responds with RST packet Unsolicited Packet Response Unsolicited SYN/ACK → Responds with RST Unsolicited RST → Ignored IP ID Characteristics ...

March 20, 2024 · 1 min · 205 words · 0xuki

Threat Intelligence

There are several categories of threat intelligence. https://info-savvy.com/types-of-threat-intelligence/ Technical Threat Intelligence Technical cyber intelligence involves collecting information about the attacker’s resources, such as command & control channels and tools. For example, it focuses on technical clues that indicate cybersecurity threats to phishing emails and malicious URLs. The goal is to collect information on specific IOCs (IP addresses, phishing email headers, hash checksums). This type of threat intelligence is important because it allows for the analysis of attacks. However, the value of technical threat intelligence is short-lived because hackers often change tactics. It is crucial to detect and analyze IOCs at the right time. Tactical intelligence is used by SOC team members. The information obtained here leads to new rules being written into the organization’s current security products (IDS/IP, firewalls, endpoint security systems, etc.). Suspicious IPs may also be detected from spam emails. The information obtained is directly fed back into the organization’s products. ...

March 10, 2024 · 3 min · 453 words · 0xuki

DoS/DDoS Attack

A Distributed Denial-of-Service (DDoS) attack is a malicious attempt to disrupt the normal operation of a targeted server, service, or network by overwhelming it with a flood of internet traffic. These attacks are executed by leveraging a multitude of compromised computer systems, often referred to as “bots” or “zombies,” which are under the control of the attacker. DDoS attacks can cause significant downtime, financial loss, and reputational damage to the targeted entity. ...

March 8, 2024 · 3 min · 586 words · 0xuki

What is a Rubber Hose Attack?

A Rubber Hose Attack refers to a technique in cryptography and cybersecurity where physical or psychological coercion is used to extract information. This term is often used metaphorically to contrast with theoretical or technical methods of breaking encryption. Background of the Term The name comes from the idea of “beating someone with a rubber hose,” symbolizing the use of violence, threats, or psychological pressure instead of technical hacking to obtain sensitive data. ...

December 23, 2023 · 2 min · 417 words · 0xuki

Social Engineering ソーシャルエンジニアリング

Social Engineeringとは ソーシャルエンジニアリングとは、不正な理由でターゲットに特定の情報を開示させたり、 特定の行動を取らせたりすることを目的としたすべてのテクニックのことを指す。 https://www.enisa.europa.eu/topics/csirts-in-europe/glossary/what-is-social-engineering Quid pro quo 何かのための何か Quid pro quoはギリシャ語で、代わり・代替などの意味。 英語ではSomething for something. 攻撃者はターゲットに対して何か利益のあることを提案して、 その見返りとして攻撃をしかけること。 低レベルの攻撃者が行うソーシャル・エンジニアリング攻撃の1つ。 例:攻撃者はある企業のITサポートを騙り、従業員にたいして、 ソフトウェアのアップデートやセキュリティ製品の導入をサポートする。 その過程で、従業員の端末にマルウェアやRATをインストールすること。 Eliciation 誘導 Elicitationとは、論法や話法によって結論(例えば真理)を引き出す、引き出すという意味。 特定のクラスの行動を呼び起こす(引き出す)刺激と定義されることもある。 米国政府の国家安全保障局では、Elicitationを “一見普通の無邪気な会話の中で、微妙に情報を引き出すこと “と定義している。 この会話は、レストラン、ジム、保育園など、ターゲットがいる場所ならどこでも発生する可能性がある。 Elicitationが有効なのは、リスクが低く、発見が困難な場合が多いからだ。ほとんどの場合、 ターゲットはどこで情報が入手されたかを知りません。

September 20, 2022 · 1 min · 31 words · 0xuki

Computer Virus 101

Virus Types: Evolving Threats in the Digital Landscape Computer viruses have evolved significantly since their inception, becoming increasingly sophisticated in their methods of infection and evasion. Here’s a closer look at some prominent types: 1. Polymorphic Viruses: The Masters of Disguise Polymorphic viruses are designed to evade detection by constantly changing their code. Each time they infect a new system, they encrypt themselves with a different key, making it difficult for traditional antivirus software to recognize them using signature-based detection. This constant mutation makes them a challenging adversary in the cybersecurity realm. ...

August 11, 2022 · 4 min · 660 words · 0xuki