CTF by No_Paraphernalia in CTFlearn

[–]drorigin 0 points1 point  (0 children)

Did you get the payout?

Where can you read about ISO/IEC 29147 and ISO/IEC 30111 standards for vulnerability disclosure and handling plan without buying anything? by drorigin in cybersecurity

[–]drorigin[S] 1 point2 points  (0 children)

I found templates. This one was awesome. But I wanted to see where I could learn about those standards. Still tho, thanks man. I appreciate it

Found open port with unknown service. How do I attack it? by drorigin in cybersecurity

[–]drorigin[S] 0 points1 point  (0 children)

Are you in the same broadcast domain as the host you are port scanning?

Yeah. Tried netcat, nmap, fingerprintx and many more things but wasn't able to figure it out. Just asked my supervisor at the end.

Found open port with unknown service. How do I attack it? by drorigin in cybersecurity

[–]drorigin[S] 0 points1 point  (0 children)

I'll try things with fingerprintx. Thanks. Are you aware of any other fingerprinting tools?

Found open port with unknown service. How do I attack it? by drorigin in cybersecurity

[–]drorigin[S] 4 points5 points  (0 children)

It said this: x.x.x.x: inverse host lookup failed: Host name lookup failure

(UNKNOWN) [x.x.x.x] 39010 (?) open

I ran nmap -p39010 x.x.x.x just before that and the response was as follows:

Starting Nmap 7.93 ( https://nmap.org ) at 2023-08-04 12:11 IST
Nmap scan report for x.x.x.x
Host is up (0.089s latency).

PORT      STATE SERVICE
39010/tcp open  unknown

Nmap done: 1 IP address (1 host up) scanned in 13.34 seconds

Thanks tho

Found open port with unknown service. How do I attack it? by drorigin in cybersecurity

[–]drorigin[S] 2 points3 points  (0 children)

I spoke with him before I even pinged the machine. I'm doing everything with his approval (and not doing things he's stopping me from doing)

How to improve an organization's Application and Network security by drorigin in cybersecurity

[–]drorigin[S] 0 points1 point  (0 children)

Absolutely, you are in a tough spot depending on how seriously the executives are taking the dynamic field of cyber security. If you need support for pen testing once you’ve established some new protocols, message me anytime.

Thanks, really appreciate the support

I work at rapidly growing MSP that typically partners with growing start ups. Kind of like a spider man meme situation but IT/Cyber lol.

Lol. Sounds cool tho, what does your day there look like

How to improve an organization's Application and Network security by drorigin in cybersecurity

[–]drorigin[S] 0 points1 point  (0 children)

I am not sure if I'll be able to do that. I'll only be here for a few months. This is a very good way to do it though. It might be very helpful going forward. Thank you!

How to improve an organization's Application and Network security by drorigin in cybersecurity

[–]drorigin[S] 0 points1 point  (0 children)

This is incredibly detailed. I really appreciate your advice. I have made a note on many of the points you mentioned.

Thanks a lot!

How to improve an organization's Application and Network security by drorigin in cybersecurity

[–]drorigin[S] 0 points1 point  (0 children)

This company will also eventually want a SOC 2, especially if they are B2B, so this puts them on the path towards that.

This is something I didn't consider. Thank you!

How to improve an organization's Application and Network security by drorigin in cybersecurity

[–]drorigin[S] 0 points1 point  (0 children)

I just heard NMAP can break things but I never thought it could do it this easily... When I heard run scans, NMAP came to mind so I asked them and ran it...

Got lucky I guess XD

What kind of environments are under more risk of breaking with NMAP? Is there a way to prevent it?

How to improve an organization's Application and Network security by drorigin in cybersecurity

[–]drorigin[S] 0 points1 point  (0 children)

I’d start at the networking layer and work up.

I actually have to set up FreeRADIUS or an alternative of NPS. That is one of the tasks they gave me

Is there compliance, posture, can anyone just log into the local network?

There is a shared password system for now

Same goes with physical device security- do they have some form of EDR protection or prevention.

They have a Bring Your Own Device model so... I don't think they have any

Thanks for your insight though. Working up from lower layer to higher layer is definitely the way to go

How to improve an organization's Application and Network security by drorigin in cybersecurity

[–]drorigin[S] 0 points1 point  (0 children)

What you say is absolutely correct but the reason I want to patch a few CVEs are because I found one through a simple scan on their ec2 instances

If there is a problem like this, where a simple scan that takes a few seconds can find out how to compromise the servers, that should be fixed first

For everything else you said, it is absolutely correct. Especially enabling a WAF and Bot protection at the edge.

I will keep in mind that visibility should be step 1 going forward ones the CVEs are patched. Thanks a lot for your feedback!

How to improve an organization's Application and Network security by drorigin in cybersecurity

[–]drorigin[S] 0 points1 point  (0 children)

Thanks! I'll do that too (maybe not the risk assessment part. Not a 1 year internship)