<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Security 101 on System Overlord</title><link>https://systemoverlord.com/tags/security-101.html</link><description>Recent content in Security 101 on System Overlord</description><generator>Hugo</generator><language>en-us</language><managingEditor>david@systemoverlord.com (David Tomaschik)</managingEditor><webMaster>david@systemoverlord.com (David Tomaschik)</webMaster><lastBuildDate>Sun, 26 Jul 2020 00:00:00 +0000</lastBuildDate><atom:link href="https://systemoverlord.com/tags/security-101/index.xml" rel="self" type="application/rss+xml"/><item><title>Security 101: Backups &amp; Protecting Backups</title><link>https://systemoverlord.com/2020/07/26/security-101-backups-protecting-backups.html</link><pubDate>Sun, 26 Jul 2020 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2020/07/26/security-101-backups-protecting-backups.html</guid><description>&lt;p&gt;I can already hear some readers saying that backups are an IT problem, and not a
security problem. The reality, of course, is that they&amp;rsquo;re both. Information
security is commonly thought of in terms of the
&lt;a href="https://en.wikipedia.org/wiki/Information_security#Key_concepts"&gt;CIA Triad&lt;/a&gt; &amp;ndash;
that is, Confidentiality, Integrity, and Availability, and it&amp;rsquo;s important to
remember those concepts when dealing with backups.&lt;/p&gt;
&lt;p&gt;We need look no farther than the troubles &lt;a href="https://techcrunch.com/2020/07/25/garmin-outage-ransomware-sources/"&gt;Garmin is
having&lt;/a&gt; in
dealing with a ransomware attack to find evidence that backups are critical.
It&amp;rsquo;s unclear whether Garmin lacked adequate backups, had their backups
ransomware&amp;rsquo;d, or is struggling to restore from backups. (It&amp;rsquo;s possible that
they never considered an issue of this scale and simply aren&amp;rsquo;t resourced to
restore this quickly, but given that the outage remains a complete outage after
4 days, I&amp;rsquo;d bet on one of those 3 conditions.)&lt;/p&gt;</description></item><item><title>Security 101: Beginning with Kali Linux</title><link>https://systemoverlord.com/2020/07/03/security-101-beginning-with-kali-linux.html</link><pubDate>Fri, 03 Jul 2020 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2020/07/03/security-101-beginning-with-kali-linux.html</guid><description>&lt;p&gt;I&amp;rsquo;ve found a lot of people who are new to security, particularly those with an
interest in penetration testing or red teaming, install &lt;a href="https://kali.org"&gt;Kali
Linux&lt;/a&gt;™&lt;sup id="fnref:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt; as one of their first forays into the
&amp;ldquo;hacking&amp;rdquo; world. In general, there&amp;rsquo;s absolutely nothing wrong with that.
Unfortunately, I also see many who end up stuck on this journey: either stuck in
the setup/installation phase, or just not knowing what to do once they get into
Kali.&lt;/p&gt;
&lt;p&gt;This isn&amp;rsquo;t going to be a tutorial about how to use the tools within Kali (though
I hope to get to some of them eventually), but it will be a tour of the
operating system&amp;rsquo;s basic options and functionality, and hopefully will help
those new to the distribution get more oriented.&lt;/p&gt;</description></item><item><title>Hacker Culture Reading List</title><link>https://systemoverlord.com/2020/06/26/security-culture-reading-list.html</link><pubDate>Fri, 26 Jun 2020 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2020/06/26/security-culture-reading-list.html</guid><description>&lt;p&gt;A friend recently asked me if I could recommend some reading about hacking and
security culture. I gave a couple of quick answers, but it inspired me to write
a blog post in case anyone else is looking for similar content. Unless
otherwise noted, I&amp;rsquo;ve read all of these books/resources and can recommend them.&lt;/p&gt;</description></item><item><title>Security 101: Two Factor Authentication (2FA)</title><link>https://systemoverlord.com/2020/05/07/security-101-two-factor-authentication-2fa.html</link><pubDate>Thu, 07 May 2020 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2020/05/07/security-101-two-factor-authentication-2fa.html</guid><description>&lt;p&gt;In this part of my &amp;ldquo;Security 101&amp;rdquo; series, I want to talk about different
mechanisms for two factor authentication (2FA) as well as why we need it in the
first place. Most of my considerations will be for the web and web
applications, and I&amp;rsquo;m explicitly ignoring local login (e.g., device unlock)
because the threat model is so different.&lt;/p&gt;</description></item><item><title>Security 101: Learning From Home</title><link>https://systemoverlord.com/2020/04/08/security-101-learning-from-home.html</link><pubDate>Wed, 08 Apr 2020 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2020/04/08/security-101-learning-from-home.html</guid><description>&lt;p&gt;Outside, there&amp;rsquo;s a pandemic. We&amp;rsquo;re being asked to stay indoors, shelter in
place, and avoid social contact. Conferences are cancelled, live trainings are
out of the question. Some businesses are closing (hopefully temporarily) and
there are unfortunate layoffs and furloughs across the board. It&amp;rsquo;s a tough
time.&lt;/p&gt;
&lt;p&gt;Rather than dwell on the negative, focusing on something else can help you get
through this mentally. Learning something or growing your skills can both help
take away from the anxiety of the situation and also help you come out of this a
better person. Whether you&amp;rsquo;re just getting started in security or looking to
advance your career, or just looking to become more security-aware as an
individual, there are some great options for learning from home. My lists below
are by no means comprehensive &amp;ndash; there&amp;rsquo;s more content than I can shake a stick
at. However, these are intended to be good for beginners and have a diverse set
of content. If you know of something I should have included, please reach out.&lt;/p&gt;</description></item><item><title>Security 101: X-Forwarded-For vs. Forwarded vs PROXY</title><link>https://systemoverlord.com/2020/03/25/security-101-x-forwarded-for-vs-forwarded-vs-proxy.html</link><pubDate>Wed, 25 Mar 2020 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2020/03/25/security-101-x-forwarded-for-vs-forwarded-vs-proxy.html</guid><description>&lt;p&gt;Over time, there have been a number of approaches to indicating the original
client and the route that a request took when forwarded across multiple proxy
servers. For HTTP(S), the three most common approaches you&amp;rsquo;re likely to
encounter are the &lt;code&gt;X-Forwarded-For&lt;/code&gt; and &lt;code&gt;Forwarded&lt;/code&gt; HTTP headers, and the &lt;code&gt;PROXY protocol&lt;/code&gt;. They&amp;rsquo;re all a little bit different, but also the same in many ways.&lt;/p&gt;
&lt;h2 id="x-forwarded-for"&gt;X-Forwarded-For&lt;/h2&gt;
&lt;p&gt;&lt;code&gt;X-Forwarded-For&lt;/code&gt; is the oldest of the 3 solutions, and was probably introduced
by the Squid caching proxy server. As the &lt;code&gt;X-&lt;/code&gt; prefix implies, it&amp;rsquo;s not an
official standard (i.e., an IETF RFC). The header is an HTTP multi-valued
header, which means that it can have one or more values, each separated by a
comma. Each proxy server should append the IP address of the host from which it
received the request. The resulting header looks something like:&lt;/p&gt;</description></item><item><title>Security 101: Virtual Private Networks (VPNs)</title><link>https://systemoverlord.com/2020/03/22/security-101-virtual-private-networks-vpns.html</link><pubDate>Sun, 22 Mar 2020 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2020/03/22/security-101-virtual-private-networks-vpns.html</guid><description>&lt;p&gt;I&amp;rsquo;m trying something new &amp;ndash; a &amp;ldquo;Security 101&amp;rdquo; series. I hope to make these
topics readable for those with no security background. I&amp;rsquo;m going to pick topics
that are either related to my other posts (such as foundational knowledge) or
just things that I think are relevant or misunderstood.&lt;/p&gt;
&lt;p&gt;Today, I want to cover Virtual Private Networks, commonly known as VPNs. First
I want to talk about what they are and how they work, then about commercial VPN
providers, and finally about common misconceptions.&lt;/p&gt;</description></item></channel></rss>