<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>christian espinosa Archives - Christian Espinosa</title>
	<atom:link href="https://christianespinosa.com/blog/tag/christian-espinosa/feed/" rel="self" type="application/rss+xml" />
	<link>https://christianespinosa.com/blog/tag/christian-espinosa/</link>
	<description>Bestselling Author &#124; Keynote Speaker &#124; Cybersecurity Expert</description>
	<lastBuildDate>Thu, 06 Apr 2023 16:46:12 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.1</generator>

<image>
	<url>https://christianespinosa.com/wp-content/uploads/2021/09/cropped-Christian-Espinosa-Blue-White-Logo-32x32.png</url>
	<title>christian espinosa Archives - Christian Espinosa</title>
	<link>https://christianespinosa.com/blog/tag/christian-espinosa/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Explanation of Cybersecurity Hashing and Collisions</title>
		<link>https://christianespinosa.com/blog/explanation-of-cybersecurity-hashing-and-collisions/</link>
					<comments>https://christianespinosa.com/blog/explanation-of-cybersecurity-hashing-and-collisions/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Sun, 29 Aug 2021 23:06:36 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[birthday attack]]></category>
		<category><![CDATA[christian espinosa]]></category>
		<category><![CDATA[cybersecurity collisions]]></category>
		<category><![CDATA[cybersecurity hashing]]></category>
		<category><![CDATA[md5]]></category>
		<category><![CDATA[video]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2592</guid>

					<description><![CDATA[<p>This blog post is a transcript of Christian Espinosa&#8217;s explanation of cybersecurity hashing and collisions and covers the following: What is hashing? What is a hashing collision? What are hashing birthday attacks? Includes a demonstration of a 3-way MD5 collision Check out my latest book: https://christianespinosa.com/books/the-smartest-person-in-the-room/ In Dec 2020, Alpine Security was acquired by Cerberus [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/explanation-of-cybersecurity-hashing-and-collisions/">Explanation of Cybersecurity Hashing and Collisions</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Explanation of Cybersecurity Hashing and Collisions' data-link='https://christianespinosa.com/blog/explanation-of-cybersecurity-hashing-and-collisions/' data-app-id-name='category_above_content'></div><p><img fetchpriority="high" decoding="async" class="alignright wp-image-2593 size-medium" src="https://christianespinosa.com/wp-content/uploads/2021/08/hashing-e1630278301960-300x189.jpg" alt="cybersecurity hashing and collisions" width="300" height="189" srcset="https://christianespinosa.com/wp-content/uploads/2021/08/hashing-e1630278301960-300x189.jpg 300w, https://christianespinosa.com/wp-content/uploads/2021/08/hashing-e1630278301960.jpg 627w" sizes="(max-width: 300px) 100vw, 300px" />This blog post is a transcript of Christian Espinosa&#8217;s explanation of cybersecurity hashing and collisions and covers the following:</p>
<ul>
<li>What is hashing?</li>
<li>What is a hashing collision?</li>
<li>What are hashing birthday attacks?</li>
<li>Includes a demonstration of a 3-way MD5 collision</li>
</ul>
<p>Check out my latest book: <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener">https://christianespinosa.com/books/the-smartest-person-in-the-room/</a></p>
<p>In Dec 2020, Alpine Security was acquired by Cerberus Sentinel (<a href="https://www.cerberussentinel.com/">https://www.cerberussentinel.com/</a>)</p>
<p>Need cybersecurity help? Connect with me: <a href="https://christianespinosa.com/cerberus-sentinel/">https://christianespinosa.com/cerberus-sentinel/</a></p>
<p><iframe title="Explanation of Cybersecurity Hashing and MD5 Collisions" width="500" height="281" src="https://www.youtube.com/embed/DqnBTP5p3_o?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2>Complete Cybersecurity Hashing and Collisions Explanation Video Transcript</h2>
<p>How&#8217;s it going? This is Christian Espinosa with Alpine Security. Today&#8217;s topic is on hashing and collisions. First off, what is hashing? A lot of people think hashing is encryption, but hashing is really not encryption. It is a mathematical function, but when you do encryption you typically need a key to decrypt something. With hashing, there&#8217;s no key involved. Hashing is really a one-way function. What that means is if we take some data and cram it through a hashing algorithm, out spits what&#8217;s called a message digest. The message digest is a fixed linked. The data we cram through the algorithm can be a variable linked. We can cram one byte or one terabyte through let&#8217;s say an MD5 hash algorithm and out spits a 128 bit message digest, regardless of the size of data we put through it. It&#8217;s called a one-way function because you can&#8217;t take the message digest value and go backwards through the hash algorithm and reproduce the data that was used to create the message digest. It doesn&#8217;t work that way. It&#8217;s only one way.</p>
<p>Hashing is used for integrity and to store passwords. Passwords should never be stored in cleartext. They should be stored in a hashed format or message digest. That way if someone types in a password on the password system, the password is hashed. If the hash value matches what&#8217;s stored, you know what the password is. There&#8217;s a little bit more to it than that, but that&#8217;s basically the concept.</p>
<p>Hashing is also used for integrity because if I take some data and run it through the hash algorithm, I get a message digest. If the data changes that all and I run it through the hash algorithm, I should get a different message digest, which tells me that the data has changed. If the data is the same, I&#8217;ve run it through the hash algorithm, I get the same message digest, I know I have integrity and the data has not been altered. One of the primary uses of hashing is for integrity and another use is for passwords.</p>
<p>There&#8217;s a lot of discussion about collisions and I&#8217;m going to do a demonstration here. Collisions are when you have two different inputs, you take it through the hash algorithm, and both different inputs produce the same message digest. That&#8217;s called a collision. Two different things produce the same thing, collision. Technically, that should not happen with hashing. If it does happen, it kind of breaks the concept of hashing because now we can have two different things that produce the same message digest. If we think this thing here hasn&#8217;t been altered, but it has been altered, and if we look at hashing to prove that it hasn&#8217;t been altered, we may have a false sense of integrity because the two different things can produce the same output or the same message digest, which is the collision.</p>
<p>I&#8217;ll give an example of collision. MD5 is a common hash algorithm that&#8217;s been broken, as they like to say, and there are examples of collisions with MD5s. MD5 uses 128 bits. SHA1 is another type of hash algorithm that uses 160 bits, and there&#8217;s quite a few other ones. SHA512 uses 512 bids. But basically the larger the message digest, the more bits, the less likely of a collision, based on simple math at math. With MD5, there&#8217;s 128 bits. There&#8217;s a lot of discussion about collisions, but the bottom line is collisions are highly unlikely, even with MD5. It&#8217;s very unlikely somebody can intelligently alter some bit of data and generate the same message digest as some other signed piece of software, for instance.</p>
<p>Let&#8217;s just look at the math for this. I&#8217;m going to bring up a calculator in scientific mode and with 128 bits, that&#8217;s 2 to the 128th power, because we have a zero or one, which the 2, 128 bits. Those are the number of combinations with 128 bits. Let&#8217;s just look at that. So 2 to the 128, equals 3.4 whatever. Basically, that&#8217;s a really large number, so the probability of creating a collision is very small. It is possible though. This probability is going to be smaller with SHA512, there&#8217;s more bits.</p>
<p>The example that this one guy has figured out with MD5, is he&#8217;s had three images that produce the same message digest. What this guy did, if you actually look at the images in a hex editor, is he basically took one base image, which had a specific message digest, then he took another image and altered a bit at a time in the header of the image and kept running it through the hash algorithm until it basically produced the same messages digested. Then he stopped altering the bits, and the images look different because we&#8217;re not looking at the metadata, we&#8217;re just looking at the actual image data, visually. Then he did it again with a third image. This is the proof that there are collisions with MD5.</p>
<p>et&#8217;s look at this here. We&#8217;re going to use this tool called HashCalc to do the calculation. HashCalc is one of my favorite hashing calculators. If we just searched for White, Black and Brown MD5, we should find what this guy did. Three-way MD5 collision, Nat McHugh&#8217;s the dude&#8217;s name. Basically, we have these three pictures, Jack Black, James Brown, Barry White, I believe. I&#8217;m going to save each of these. I&#8217;m going to save this one as Jack Black. This one is James Brown. This one is Barry White. Then we&#8217;ll run these three through the hash calculator. And you can see, I&#8217;ll go ahead and open the images. If we look at the images, this one is obviously different than this one, and different than this one right here. The three images are different. The three data sets are different, but they produce the same MD5 message digest.</p>
<p>Let&#8217;s check this out. Here&#8217;s HashCalc. I&#8217;ll put the link to HashCalc in the video. With HashCalc you can just drag and drop the image. Here is Black, I&#8217;m going to drag it over here. Before I do that, I&#8217;ve got MD5 selected and I also have SHA1 selected. We&#8217;ll do the message digest for both of those algorithms. So there&#8217;s Black, here&#8217;s the message digest. I&#8217;ll go ahead and copy this. I&#8217;ll put this here in our notepad. Black equals this. That&#8217;s the MD5, and the SHA1 though, is this, for Black. That&#8217;s the SHA1. Let&#8217;s try White. White equals&#8230; Let&#8217;s take White and we&#8217;re going to drag the White image to HashCalc. So the MD5 for White is this. That&#8217;s MD5. The SHA1 is this. And with Brown, let&#8217;s try that one. You kind of know where this is all headed, right? With Brown, we expect the MD5 to be the same. We&#8217;ll drag it over here, I&#8217;ll go ahead and copy that. Brown MD5, it looks like it&#8217;s the same. The SHA1 should be different.</p>
<p>All right. With Jack Black, MD5 right here, Barry White right here, and James Brown, same MD5, three different inputs, that&#8217;s a collision. You notice the SHA1 is different for all three though. It is extremely, extremely unlikely you can create a collision that works with all hash algorithms. I&#8217;ve never seen that done. I doubt anyone can do it. If you want to check for collisions, just simply use two different hash algorithms.</p>
<p>I was going to talk about the birthday attack. That&#8217;s the other thing I have in the list here. The birthday attack is simply this mathematical probability. They like to talk about it a lot in certifications like the CISPD and Security Plus. All it really is, is probability. The whole idea is if given enough sample size and with birthday is we mean, if we have more than 23 people in a room, or 23 or more, the likelihood of two people sharing the same birthday, not the same birth year, but the same birthday, is over 50%. That&#8217;s because we&#8217;re not comparing everyone to you. We&#8217;re compared to everyone to each other. It&#8217;s just simple probability.</p>
<p>They like to use this concept to say how easy it is to create a collision with hashing. It&#8217;s not really that easy. It might be relatively easy for MD%, but still like the Jack Black, James Brown and Barry White, those are simply images where the header or metadata of the image was altered. To be able to intelligently alter something, to make a malicious file look like a signed piece of software, in my opinion, it&#8217;s not going to happen, regardless of what people say about this birthday attack and how easy this is, it&#8217;s really not that simple.</p>
<p>That&#8217;s all I wanted to talk about today, what hashing is, one-way function. You can&#8217;t take the message digest and go backwards and recreate the piece of data used to generate the message digest. We talked about collisions. There are collisions with MD5. It&#8217;s been broken per se, so has SHA1. But if you use two different hash algorithms, even if you have a collision on one, you could easily tell the data is different. We went over an actual example with collisions. We also went over HashCalc. I&#8217;ll put the link to HashCalc as well as a link to Nat McHugh&#8217;s site where you can download the Barry White, Jack Black and James Brown images and test out the collisions yourself.</p>
<p>If you have any questions or comments, you can lead them beneath the video. Please subscribe to our channel. Click on the little bell so you get notified when we have new videos. Thanks for watching. Have a great one.</p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Explanation of Cybersecurity Hashing and Collisions' data-link='https://christianespinosa.com/blog/explanation-of-cybersecurity-hashing-and-collisions/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Explanation of Cybersecurity Hashing and Collisions' data-link='https://christianespinosa.com/blog/explanation-of-cybersecurity-hashing-and-collisions/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/explanation-of-cybersecurity-hashing-and-collisions/">Explanation of Cybersecurity Hashing and Collisions</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/explanation-of-cybersecurity-hashing-and-collisions/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Explanation of the Cybersecurity CIA Triad</title>
		<link>https://christianespinosa.com/blog/explanation-of-the-cybersecurity-cia-triad/</link>
					<comments>https://christianespinosa.com/blog/explanation-of-the-cybersecurity-cia-triad/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Sun, 29 Aug 2021 22:27:20 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[availability]]></category>
		<category><![CDATA[christian espinosa]]></category>
		<category><![CDATA[confidentiality]]></category>
		<category><![CDATA[cybersecurity cia triad]]></category>
		<category><![CDATA[integrity]]></category>
		<category><![CDATA[video]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2589</guid>

					<description><![CDATA[<p>This blog post is a transcript of Christian Espinosa&#8217;s explanation of the Cybersecurity CIA Triad, and the opposite &#8211; DAD, and covers the following: CIA = Confidentiality, Integrity, and Availability Technologies used for each: Confidentiality = Encryption Integrity = Hashing Availability = Load-Balancers, Hot Sites DAD = Disclosure, Alteration, and Destruction/Denial Check out my latest [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/explanation-of-the-cybersecurity-cia-triad/">Explanation of the Cybersecurity CIA Triad</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Explanation of the Cybersecurity CIA Triad' data-link='https://christianespinosa.com/blog/explanation-of-the-cybersecurity-cia-triad/' data-app-id-name='category_above_content'></div><p><img decoding="async" class="alignright wp-image-2591 " src="https://christianespinosa.com/wp-content/uploads/2021/08/cia-e1630277189283.jpg" alt="cybersecurity cia triad" width="360" height="212" srcset="https://christianespinosa.com/wp-content/uploads/2021/08/cia-e1630277189283.jpg 638w, https://christianespinosa.com/wp-content/uploads/2021/08/cia-e1630277189283-300x177.jpg 300w" sizes="(max-width: 360px) 100vw, 360px" />This blog post is a transcript of Christian Espinosa&#8217;s explanation of the Cybersecurity CIA Triad, and the opposite &#8211; DAD, and covers the following:</p>
<ul>
<li>CIA = Confidentiality, Integrity, and Availability</li>
<li>Technologies used for each:
<ul>
<li>Confidentiality = Encryption</li>
<li>Integrity = Hashing</li>
<li>Availability = Load-Balancers, Hot Sites</li>
</ul>
</li>
<li>DAD = Disclosure, Alteration, and Destruction/Denial</li>
</ul>
<ul>
<li style="list-style-type: none;"></li>
</ul>
<p>Check out my latest book: <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener">https://christianespinosa.com/books/the-smartest-person-in-the-room/</a></p>
<p>In Dec 2020, Alpine Security was acquired by Cerberus Sentinel (<a href="https://www.cerberussentinel.com/">https://www.cerberussentinel.com/</a>)</p>
<p>Need cybersecurity help? Connect with me: <a href="https://christianespinosa.com/cerberus-sentinel/">https://christianespinosa.com/cerberus-sentinel/</a></p>
<p><iframe title="Explanation of the Cybersecurity CIA Triad" width="500" height="281" src="https://www.youtube.com/embed/v62YNGFJWfc?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2>Complete Cybersecurity CIA Triad Explanation Video Transcript</h2>
<p>Hey everybody. This is Christian Espinosa with Alpine Security. Today&#8217;s topic is on CIA, not the Central Intelligence Agency, but confidentiality, integrity and availability. These three things are what we try to achieve with cybersecurity.</p>
<p>With confidentiality, we&#8217;re trying to prevent unauthorized disclosure of our data. The technology we typically use with confidentiality is encryption. So I want to encrypt my data in transit and at rest. So if I&#8217;m sending some data to Amazon, such as my credit card number, and somebody intercepts it, they can&#8217;t read the data unless they have the encryption key. It&#8217;s kept secret. If somebody steals my hard drive and I&#8217;ve encrypted my hard drive, my data is not disclosed to them unless they can decrypt the hard drive. So confidentiality, the technology we use is encryption.</p>
<p>Integrity is to make sure our data is not altered, either intentionally or unintentionally. That technology we use for integrity is <a href="https://christianespinosa.com/blog/explanation-of-cybersecurity-hashing-and-collisions/" target="_blank" rel="noopener">hashing</a>. So if we use a hashing algorithm, such as MD5, SHA1, SHA512, if we use any of those, we take the data, we run it through this hash algorithm, it spits out what&#8217;s called the message digest, that if I send you the data, you run the data you received from me through the same hash algorithm, you get a message digest. If your message digest matches, sorry, my message digest, then the data has not been altered. So that&#8217;s hashing and that&#8217;s used to prevent alteration or to see if data has been altered.</p>
<p>The a stands for availability. If the data is not available, it&#8217;s kind of useless. With availability, we typically use things like load balancers, backup sites, hot sites, mirrored sites, et cetera for availability.</p>
<p>The opposite of CIA, is DAD. That stands for disclosure, alteration and destruction. With disclosure, it&#8217;s the opposite of confidentiality. So if your data is disclose to me or to a hacker, you have no longer achieved the objective of confidentiality. With the A, alteration, if your data is supposed to have integrity, but I&#8217;m able to alter it. Let&#8217;s say I go to your shopping cart and I can change the price of your thousand dollar item to $1 then I&#8217;ve altered your data and that is not achieving integrity. The other D stands for destruction or denial of service. So if I&#8217;m able to destroy your system, like your server, or do it the of service on your server, then I have removed the availability of your system to your users. So that&#8217;s DAD, disclosure, alteration and destruction.</p>
<p>I hope you enjoyed this. Quick tutorial on CIA and DAD. If you have any questions or comments leave them beneath the video. Please subscribe to our channel. Thanks. I&#8217;ll talk to you later.</p>
<p><!--HubSpot Call-to-Action Code --><span id="hs-cta-wrapper-94f60ee8-4fbe-483b-8a0f-ad83ab12a665" class="hs-cta-wrapper"><span id="hs-cta-94f60ee8-4fbe-483b-8a0f-ad83ab12a665" class="hs-cta-node hs-cta-94f60ee8-4fbe-483b-8a0f-ad83ab12a665"><!-- [if lte IE 8]>


<div id="hs-cta-ie-element"></div>


<![endif]--><a href="https://cta-redirect.hubspot.com/cta/redirect/7462611/94f60ee8-4fbe-483b-8a0f-ad83ab12a665" target="_blank" rel="noopener"><img decoding="async" id="hs-cta-img-94f60ee8-4fbe-483b-8a0f-ad83ab12a665" class="hs-cta-img" style="border-width: 0px;" src="https://no-cache.hubspot.com/cta/default/7462611/94f60ee8-4fbe-483b-8a0f-ad83ab12a665.png" alt="Check Out The Smartest Person in The Room" /></a></span><script charset="utf-8" src="https://js.hscta.net/cta/current.js"></script><script type="text/javascript"> hbspt.cta.load(7462611, '94f60ee8-4fbe-483b-8a0f-ad83ab12a665', {"useNewLoader":"true","region":"na1"}); </script></span><!-- end HubSpot Call-to-Action Code --></p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Explanation of the Cybersecurity CIA Triad' data-link='https://christianespinosa.com/blog/explanation-of-the-cybersecurity-cia-triad/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Explanation of the Cybersecurity CIA Triad' data-link='https://christianespinosa.com/blog/explanation-of-the-cybersecurity-cia-triad/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/explanation-of-the-cybersecurity-cia-triad/">Explanation of the Cybersecurity CIA Triad</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/explanation-of-the-cybersecurity-cia-triad/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Black Box Penetration Testing Explained</title>
		<link>https://christianespinosa.com/blog/black-box-penetration-testing-explained/</link>
					<comments>https://christianespinosa.com/blog/black-box-penetration-testing-explained/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Sun, 29 Aug 2021 17:29:41 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[black box penetration test]]></category>
		<category><![CDATA[christian espinosa]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[pen testing]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[video]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2582</guid>

					<description><![CDATA[<p>This blog post is a transcript of Christian Espinosa&#8217;s explanation of Black Box Penetration Testing, which covers the following: Differences between Black, Gray, and White Box Penetration Tests Internal vs. External Black Box Penetration Tests Blac Box Threats Emulated External Hacker with little or no insider knowledge Rogue Device Internal Intruder Check out my latest [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/black-box-penetration-testing-explained/">Black Box Penetration Testing Explained</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Black Box Penetration Testing Explained' data-link='https://christianespinosa.com/blog/black-box-penetration-testing-explained/' data-app-id-name='category_above_content'></div><p><img decoding="async" class="wp-image-2583 alignright" src="https://christianespinosa.com/wp-content/uploads/2021/08/maxresdefault-1-300x169.jpg" alt="Black Box Penetration Testing" width="380" height="214" srcset="https://christianespinosa.com/wp-content/uploads/2021/08/maxresdefault-1-300x169.jpg 300w, https://christianespinosa.com/wp-content/uploads/2021/08/maxresdefault-1-1024x576.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2021/08/maxresdefault-1-768x432.jpg 768w, https://christianespinosa.com/wp-content/uploads/2021/08/maxresdefault-1-800x450.jpg 800w, https://christianespinosa.com/wp-content/uploads/2021/08/maxresdefault-1.jpg 1280w" sizes="(max-width: 380px) 100vw, 380px" />This blog post is a transcript of Christian Espinosa&#8217;s explanation of Black Box Penetration Testing, which covers the following:</p>
<ul>
<li>Differences between Black, <a href="https://christianespinosa.com/blog/gray-box-penetration-testing-explained/" target="_blank" rel="noopener">Gray</a>, and <a href="https://christianespinosa.com/blog/white-box-penetration-testing-explained/" target="_blank" rel="noopener">White Box</a> Penetration Tests</li>
<li>Internal vs. External Black Box Penetration Tests</li>
<li>Blac Box Threats Emulated
<ul>
<li>External Hacker with little or no insider knowledge</li>
<li>Rogue Device</li>
<li>Internal Intruder</li>
</ul>
</li>
</ul>
<p>Check out my latest book: <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener">https://christianespinosa.com/books/the-smartest-person-in-the-room/</a></p>
<p>Need a black box penetration test, check out my company <a href="https://bluegoatcyber.com/services/penetration-testing/black-box-penetration-testing/" target="_blank" rel="noopener">Blue Goat Cyber&#8217;s Black Box Penetration Test Services</a>.</p>
<p><iframe title="Black Box Penetration Testing Explained" width="500" height="281" src="https://www.youtube.com/embed/Xc4IcyVErgs?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2>Complete Black Box Penetration Testing Video Transcript</h2>
<p>Hi, this is Christian Espinosa with Alpine Security. In this video, we&#8217;ll cover black box penetration tests. In a previous video, we covered<a href="https://christianespinosa.com/blog/gray-box-penetration-testing-explained/" target="_blank" rel="noopener"> gray box penetration tests</a>. I&#8217;ll put the link to that video beneath this one. With a black box penetration test, we have the least amount of knowledge from the scale of black, gray and white. A black box penetration test, you typically know very little about the target, maybe the IP address or the URL. With a gray box, you have a little bit more knowledge, typically user-level knowledge. In a <a href="https://christianespinosa.com/blog/white-box-penetration-testing-explained/" target="_blank" rel="noopener">white box</a>, you typically have administrator-level knowledge or access to the schematics, the source code, the design documents, et cetera. Also with black box, this is called unauthenticated often because we do not have any level of access from a user perspective, like gray box or an administrator route level perspective like white box.</p>
<p>A black box penetration test can be used both internally and externally, and we&#8217;ll go over more detail of that in a second on the next slide. The threats we&#8217;re trying to emulate with a black box penetration test are an external attacker with very little knowledge about your environment, a rogue device, or an internal intruder. We&#8217;ll cover those in more detail here in a second. With an external black box penetration test, we&#8217;re looking at the perspective from outside your network. We&#8217;re testing your public-facing systems. If you&#8217;re in an organization where testing the systems that are exposed to the internet &#8230; so this could be a firewall, a router, a VPN concentrator, your web server. Anything you have exposed to the internet that your employees can access or your clients can access is what we&#8217;re testing from an external black box penetration testing perspective.</p>
<p>What we&#8217;re trying to emulate is an external attacker. This could be a script kiddie, somebody in China just scanning and looking to see what they can get into. It can be a botnet that&#8217;s just trying to scan for vulnerable systems, or it could be an active attacker trying to get into your environment. An example of what we might test could be your external firewall. If you&#8217;re a small organization, and all of your internal systems are Natted through a firewall for instance, you want to make sure that those firewall rules are set up properly, and you&#8217;re not allowing inbound traffic. You&#8217;re only allowing outbound traffic, and you have some rules in place. As an example, if you type in from the internal network, what is my IP, in Google, you can figure out what your public facing IP address is. This is something we would want to test because if your public facing IP address, which is often your external router or firewall, has a hole in it then the attacker may be able to exploit that hole and get access to your internal environment.</p>
<p>Here on the picture we have, what is my IP, we have 71.14.247.83. As a quick example, if I go to Zenmap, which you can see right here, which is basically Nmap, but a graphical user interface for Nmap. This is just a quick example of reconnaissance. They put it in that IP address here, which we put in, 71.14.247.83. Let&#8217;s say I do a regular scan, so I&#8217;m looking for holes on your external facing router or firewall, or you could have a next-gen firewall, you could have a UTM, et cetera. Go ahead on click on scan here. This is the first step with penetration testing. We&#8217;re trying to identify holes you may have. Right now, I&#8217;m just using Nmap with a default setting, which looks for the top 1000 ports.</p>
<p>It looks like we have four ports open, 53, 80, 1111 and 2111. If somebody performed an external black box penetration test against your firewall or external router, this is what they would see. Granted, they should scan all 65,535 ports. But this is the top 1000, and we have four ports open out of the top 1000. We can see here that there&#8217;s a web server running, DNS running, a few other things. And now the next step would be to identify a vulnerability and then exploit that vulnerability if possible. The reason this is important because if you have a publicly exposed IP address with a vulnerability, somebody could exploit that vulnerability and potentially pivot from the external facing system. From there, they could pivot to your internal environment and get access to your internal environment or get access to a sequel database or something else. You want to make sure you test your environment from an external perspective.</p>
<p>With an internal black box penetration test, we&#8217;re looking at the environment from inside your firewall. Really, we&#8217;re trying to emulate two threats, two main threats here. One of them is a rogue device, and one of them is an internal intruder. Basically, and these could kind of bleed together as the same thing because an internal intruder could plant a rogue device. But the idea is what if somebody walks into your environment and they plant a rogue device? As we see here, this is a phone plug on the screen in the picture. Let&#8217;s say they plant this device on your network. This device is a rogue device which intercepts your traffic, and can send it out via a cellular network to somebody else. Or it could actually phone home through your network and duplicate the traffic that way. Or it could serve as a pivot point.</p>
<p>There&#8217;s a number of things it can do, but basically the idea is can you detect or are you protected against a rogue device or an internal intruder? An internal intruder example that might be, let&#8217;s say I walk into a dentist office, I&#8217;m waiting for my appointment, I&#8217;m sitting in a chair in the waiting room and I&#8217;ve got my laptop. I&#8217;m kind of bored because I&#8217;m waiting a long time, but I noticed there&#8217;s an ethernet jack exposed in the wall behind me. Let&#8217;s say I plugged my laptop into that jack, and I just started screwing around and see what I can see on the network. If I can scan the network and maybe exploit a device on the network, on that dentist&#8217;s network, that&#8217;s from an internal intruder perspective.</p>
<p>Those are why we would do a black box penetration test. In summary, what we talked about are black box penetration test. The black is the least amount of information between from gray to white. You have limited knowledge, unauthenticated. A black box penetration test can be used to emulate an external attacker as well as an internal attacker or internal rogue device. That&#8217;s basically it. The black box is really the simplest type of penetration test, and it should definitely be something you consider. If you have any questions about black box penetration tests, you can leave them beneath the video. You can also subscribe to our channel. And if you&#8217;re interested in a black box penetration test against your environment, you can contact us at <a href="https://bluegoatcyber.com/services/penetration-testing/black-box-penetration-testing/">www.bluegoatcyber.com</a>. Thanks. Have a good one.</p>
<p><script charset="utf-8" type="text/javascript" src="//js.hsforms.net/forms/embed/v2.js"></script><br />
<script>
  hbspt.forms.create({
    region: "na1",
    portalId: "7462611",
    formId: "44520873-dd69-4756-ae28-5df1df179d14"
  });
</script></p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Black Box Penetration Testing Explained' data-link='https://christianespinosa.com/blog/black-box-penetration-testing-explained/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Black Box Penetration Testing Explained' data-link='https://christianespinosa.com/blog/black-box-penetration-testing-explained/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/black-box-penetration-testing-explained/">Black Box Penetration Testing Explained</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/black-box-penetration-testing-explained/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Gray Box Penetration Testing Explained</title>
		<link>https://christianespinosa.com/blog/gray-box-penetration-testing-explained/</link>
					<comments>https://christianespinosa.com/blog/gray-box-penetration-testing-explained/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Sun, 29 Aug 2021 17:23:01 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[christian espinosa]]></category>
		<category><![CDATA[gray box penetration testing]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[pen testing]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[video]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2579</guid>

					<description><![CDATA[<p>This blog post is a transcript of Christian Espinosa&#8217;s explanation of Gray Box Penetration Testing, which covers the following: Differences between Black, Gray, and White Box Penetration Tests Gray Box = Authenticated &#8220;User&#8221; level tests Internal vs. External Gray Box Penetration Tests Often includes Black Box Testing Gray Box Threats Emulated Compromised User Account Malicious [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/gray-box-penetration-testing-explained/">Gray Box Penetration Testing Explained</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Gray Box Penetration Testing Explained' data-link='https://christianespinosa.com/blog/gray-box-penetration-testing-explained/' data-app-id-name='category_above_content'></div><p><img loading="lazy" decoding="async" class="wp-image-2580 alignright" src="https://christianespinosa.com/wp-content/uploads/2021/08/Gray-300x169.jpg" alt="Gray Box Penetration Testing" width="383" height="216" srcset="https://christianespinosa.com/wp-content/uploads/2021/08/Gray-300x169.jpg 300w, https://christianespinosa.com/wp-content/uploads/2021/08/Gray-1024x576.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2021/08/Gray-768x432.jpg 768w, https://christianespinosa.com/wp-content/uploads/2021/08/Gray-800x450.jpg 800w, https://christianespinosa.com/wp-content/uploads/2021/08/Gray.jpg 1280w" sizes="(max-width: 383px) 100vw, 383px" />This blog post is a transcript of Christian Espinosa&#8217;s explanation of Gray Box Penetration Testing, which covers the following:</p>
<ul>
<li>Differences between <a href="https://christianespinosa.com/blog/black-box-penetration-testing-explained/" target="_blank" rel="noopener">Black</a>, Gray, and <a href="https://christianespinosa.com/blog/white-box-penetration-testing-explained/" target="_blank" rel="noopener">White Box Penetration Tests</a></li>
<li>Gray Box = Authenticated &#8220;User&#8221; level tests</li>
<li>Internal vs. External Gray Box Penetration Tests</li>
<li>Often includes Black Box Testing</li>
<li>Gray Box Threats Emulated
<ul>
<li>Compromised User Account</li>
<li>Malicious Insider</li>
</ul>
</li>
</ul>
<p>Check out my latest book: <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener">https://christianespinosa.com/books/the-smartest-person-in-the-room/</a></p>
<p>In Dec 2020, Alpine Security was acquired by Cerberus Sentinel (<a href="https://www.cerberussentinel.com/">https://www.cerberussentinel.com/</a>)</p>
<p>Need a penetration test? Connect with me: <a href="https://christianespinosa.com/cerberus-sentinel/">https://christianespinosa.com/cerberus-sentinel/</a></p>
<p><iframe title="Gray Box Penetration Testing Explained" width="500" height="281" src="https://www.youtube.com/embed/v6GCYBFGTh8?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2>Complete Gray Box Penetration Testing Video Transcript</h2>
<p>What&#8217;s going on. This is Christian Espinosa with Alpine Security. In this video, we&#8217;ll go over gray box penetration tests. These are the topics we&#8217;ll discuss. The differences between black, white and gray box. A gray box falls between black and white box penetration tests. So with a black box penetration test, you typically don&#8217;t know much about the target other than maybe the IP address or the URL. That&#8217;s really about it. A black box is considered unauthenticated. You don&#8217;t know much about the target. With a gray box, you know a little bit about the target, pretty much from the perspective of the user, your user on the target. So you have user-level access to the target. With white box, you know quite a bit about the target. So you may have access to the network diagram, schematics, design documents, source code, administrator-level access, et cetera. Black have pretty much little limited access, gray in the middle, then white.</p>
<p>As the next bullet there says, gray box, you have authenticated or credentialed user level access to the system. There&#8217;s really two broad categories for gray box penetration testers, internal and external. We&#8217;ll go over those in the next couple of slides. The threats we&#8217;re trying to emulate, which with a penetration test, you&#8217;re trying to emulate some sort of threat. The threats we&#8217;re trying to emulate with gray box typically are these two threats we have listed on the slide there. A user account is compromised. So let&#8217;s say I&#8217;m Larry. I&#8217;m a user on your web application. What can the attacker do from Larry&#8217;s account&#8217;s perspective? Or I&#8217;m Nancy, a user on your active directory domain, and my account is compromised via a phishing email. So what can the attacker do from Nancy&#8217;s perspective on the internal network? What if Larry is just malicious, or what if Nancy, she&#8217;s malicious as well? Those are the threats we&#8217;re trying to emulate.</p>
<p>For external gray box penetration tests, typically, and this is where the categories I&#8217;ve mentioned, we have external and internal. Typically with external gray box penetration tests, it&#8217;s against some sort of web application. A common example as we have here on the slide is a patient portal. So a lot of hospitals and clinics have a patient portal. This is if you&#8217;re a patient, you can log on, pay your bill, look at your last visit, look at the details, maybe schedule an appointment, et cetera. With a gray box penetration test, what we&#8217;re trying to do is test the patient portal in this scenario from the perspective of, like I mentioned earlier, a compromised user or a malicious user. So if I am Larry and I&#8217;m logging on to the patient portal as Larry. From Larry&#8217;s account, what can I get access to on the patient portal? If there&#8217;s a vulnerability, can Larry, for some reason, exploit that vulnerability and somehow get access to Pam&#8217;s account, for instance? Because it would not be good if Larry can horizontally get access to Pam&#8217;s account and then read Pam&#8217;s medical history. That&#8217;s an example of a horizontal privilege escalation.</p>
<p>The other scenario is what if Larry can somehow exploit a vulnerability on the patient portal and get admin or root level permissions? Larry can see everybody&#8217;s information, including Pam&#8217;s, Sam&#8217;s, Dan&#8217;s, et cetera. So that would not be good. With a gray box penetration test, we look at the vulnerabilities of the application from the perspective of the user.</p>
<p>Let me give an example here. I&#8217;ll bring over a patient portal here. This is just an example. If I go to Google and search for patient portal, you&#8217;ll see quite a few of them pop up here. I just went to the first one right here. This is a whatever, NextGen Healthcare, it doesn&#8217;t really matter. But right now, if we&#8217;re looking at the patient portal and we&#8217;re not logged in, and let&#8217;s say we do some testing, this would be black box penetration testing. Once we&#8217;ve logged in as a user such as Larry, then we would be testing it from a gray box perspective. An example like let&#8217;s say from a black box perspective, if I type in tick or one equals one dash dash and I just put whatever here as a test for a SQL injection, that&#8217;s a black box test. With a gray box, we would test a lot of different things, but logged on as Larry, as I mentioned.</p>
<p>With Alpine security, we include the black box portion of testing with our gray box because we tested from both an unauthenticated perspective and an authenticated perspective. So that&#8217;s an example of an external gray box penetration test.</p>
<p>The other type of gray box penetration test is an internal gray box penetration test. With an internal box penetration test, what we&#8217;re looking at is what sort of damage could an internal user do with user level permissions on an internal network inside a firewall such as an active directory domain? If Sally&#8217;s computer was compromised or Sally clicked on a phishing email and her account was compromised, from the perspective of Sally&#8217;s credentials, which are user level credentials, what could the attacker do? Could the attacker somehow get access to sensitive data? Could they get access to Bruce&#8217;s account? Could they somehow find a vulnerability and exploit it on the network that gave them administrator level permission, such as domain admin, et cetera? So we&#8217;re looking at it from that perspective, and we&#8217;re also looking at from the perspective, like what if a Rodrigo, let&#8217;s say, is malicious and Rodrigo wants to steal secrets and send them to China? If Rodrigo is a malicious user, what can Rodrigo get access to using his user-level permissions? That&#8217;s the other sort of use case or threat we&#8217;re emulating.</p>
<p>Another use case is, let&#8217;s say a user&#8217;s laptop was compromised. Let&#8217;s say Jessica takes her laptop home and her boyfriend who was a spy for Russia, let&#8217;s say, gets his hands on the laptop. If the boyfriend, the spy from Russia, gets the hands on Jessica&#8217;s laptop and that boyfriend can get into Jessica&#8217;s laptop, let&#8217;s say the boyfriend&#8217;s name is Ivan. Ivan can get into Jessica&#8217;s laptop as Jessica, or Jessica leads the laptop unlocked. What sort of damage could Ivan do to that laptop or to the systems the laptop has access to? So if the laptop can VPN into the corporate network, what can Ivan get access to as Jessica? Also, Ivan can try to get access to secret stuff on the laptop. Can he escalate privileges to local admin on the laptop? Can he circumvent controls, et cetera? So again, that is an internal gray box penetration test, and we&#8217;re looking at it from the perspective of really two broad categories of threats. A malicious user or a compromised user that really didn&#8217;t mean to be malicious but their account was compromised.</p>
<p>As a summary, we talked about these main points here, the differences between black and white and gray. Gray is in the middle, black you have limited information, maybe just an IP address or URL. White, you have a lot of information. Gray, you have user level information and user level access. Which is also authenticated or credentialed. We explained a little bit the differences between internal and external. External is typically with a web application such as a patient portal. We&#8217;re testing if we can escalate privileges horizontally or vertically. With internal, we&#8217;re testing from a domain user or internal user, typically inside your firewall, and we&#8217;re seeing what we can do. Same concept from escalating privileges, horizontally or vertically, and what data an insider or internal user can get access to.</p>
<p>If you have any questions about gray box penetration testing, you can leave them beneath the video. If you are interested in us performing a gray box penetration tests against your environment, either externally or internally, you can contact us at alpinesecurity.com. You can also subscribe to our channel. If you just want to learn more about penetration testing, feel free to reach out to us or take one of our classes.</p>
<p><!--HubSpot Call-to-Action Code --><span id="hs-cta-wrapper-94f60ee8-4fbe-483b-8a0f-ad83ab12a665" class="hs-cta-wrapper"><span id="hs-cta-94f60ee8-4fbe-483b-8a0f-ad83ab12a665" class="hs-cta-node hs-cta-94f60ee8-4fbe-483b-8a0f-ad83ab12a665"><!-- [if lte IE 8]>


<div id="hs-cta-ie-element"></div>


<![endif]--><a href="https://cta-redirect.hubspot.com/cta/redirect/7462611/94f60ee8-4fbe-483b-8a0f-ad83ab12a665" target="_blank" rel="noopener"><img decoding="async" id="hs-cta-img-94f60ee8-4fbe-483b-8a0f-ad83ab12a665" class="hs-cta-img" style="border-width: 0px;" src="https://no-cache.hubspot.com/cta/default/7462611/94f60ee8-4fbe-483b-8a0f-ad83ab12a665.png" alt="Check Out The Smartest Person in The Room" /></a></span><script charset="utf-8" src="https://js.hscta.net/cta/current.js"></script><script type="text/javascript"> hbspt.cta.load(7462611, '94f60ee8-4fbe-483b-8a0f-ad83ab12a665', {"useNewLoader":"true","region":"na1"}); </script></span><!-- end HubSpot Call-to-Action Code --></p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Gray Box Penetration Testing Explained' data-link='https://christianespinosa.com/blog/gray-box-penetration-testing-explained/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Gray Box Penetration Testing Explained' data-link='https://christianespinosa.com/blog/gray-box-penetration-testing-explained/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/gray-box-penetration-testing-explained/">Gray Box Penetration Testing Explained</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/gray-box-penetration-testing-explained/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>White Box Penetration Testing Explained</title>
		<link>https://christianespinosa.com/blog/white-box-penetration-testing-explained/</link>
					<comments>https://christianespinosa.com/blog/white-box-penetration-testing-explained/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Fri, 27 Aug 2021 20:55:15 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[christian espinosa]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[pen testing]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[video]]></category>
		<category><![CDATA[white box penetration testing]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2576</guid>

					<description><![CDATA[<p>This blog post is a transcript of Christian Espinosa&#8217;s explanation of White Box Penetration Testing, which covers the following: Differences between Black, Gray, and White Box Penetration Tests White Box = Full knowledge about the target White Box is typically used during development or system integration Often includes Black and Gray Box Threats emulated: Poor [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/white-box-penetration-testing-explained/">White Box Penetration Testing Explained</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='White Box Penetration Testing Explained' data-link='https://christianespinosa.com/blog/white-box-penetration-testing-explained/' data-app-id-name='category_above_content'></div><p><img loading="lazy" decoding="async" class=" wp-image-2577 alignright" src="https://christianespinosa.com/wp-content/uploads/2021/08/white-300x169.jpg" alt="white box penetration testing - christian espinosa" width="359" height="202" srcset="https://christianespinosa.com/wp-content/uploads/2021/08/white-300x169.jpg 300w, https://christianespinosa.com/wp-content/uploads/2021/08/white-1024x576.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2021/08/white-768x432.jpg 768w, https://christianespinosa.com/wp-content/uploads/2021/08/white-800x450.jpg 800w, https://christianespinosa.com/wp-content/uploads/2021/08/white.jpg 1280w" sizes="(max-width: 359px) 100vw, 359px" />This blog post is a transcript of Christian Espinosa&#8217;s explanation of White Box Penetration Testing, which covers the following:</p>
<ul>
<li>Differences between <a href="https://christianespinosa.com/blog/black-box-penetration-testing-explained/" target="_blank" rel="noopener">Black</a>, <a href="https://christianespinosa.com/blog/gray-box-penetration-testing-explained/" target="_blank" rel="noopener">Gray</a>, and White Box Penetration Tests</li>
<li>White Box = Full knowledge about the target</li>
<li>White Box is typically used during development or system integration</li>
<li>Often includes Black and Gray Box</li>
<li>Threats emulated:
<ul>
<li>Poor coding practices</li>
<li>Supply chain issues</li>
</ul>
</li>
</ul>
<p>Check out my latest book: <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener">https://christianespinosa.com/books/the-smartest-person-in-the-room/</a></p>
<p>In Dec 2020, Alpine Security was acquired by Cerberus Sentinel (<a href="https://www.cerberussentinel.com/">https://www.cerberussentinel.com/</a>)</p>
<p>Need a penetration test? Connect with me: <a href="https://christianespinosa.com/cerberus-sentinel/">https://christianespinosa.com/cerberus-sentinel/</a></p>
<p><iframe title="White Box Penetration Testing Explained" width="500" height="281" src="https://www.youtube.com/embed/C3xcvBasJj8?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2>Complete White Box Penetration Testing Video Transcript</h2>
<p>Hello. This is Christian Espinosa with Alpine Security. In this video, we&#8217;ll cover white box penetration tests. This completes our series, the three video series of the different colored boxes of penetration tests. We already did a video on both the black and gray box penetration tests. With a white box penetration test, we know the most about the target. Just a quick review. With a black box, we know very little about the target other than maybe the target&#8217;s IP address or URL. With a gray box, we know a little bit more than a black box. We often have user-level access to the target such as a user-level account on a web application, or maybe an active directory user-level account. With white box though, we know the most about the target. Sometimes with white box, we have root-level or administrator-level permissions.</p>
<p>We also often have access to data-flow diagrams, entity-relationship diagrams, maybe even the source code, maybe even access to the developers that are actually producing the software, or developing the software, or the product. Typically, with a white box penetration test, this is most often used during development of software or a product. It&#8217;s much more beneficial to have somebody from a penetration testing team working with your developers during the development process than waiting until your product is released and then hiring a penetration testing team to poke holes in it after it&#8217;s already been released. It costs a lot more money to fix it, and it&#8217;s much more difficult to fix after it&#8217;s been released. That&#8217;s why a white box is typically done as part of the development cycle for a product or software.</p>
<p>It could also be performed during system integration. Let&#8217;s say you&#8217;re a systems integrator, and you integrate different subsystems from different suppliers. You integrate all that into your overall system. You have to have some degree of trust that your suppliers are actually designing their components to your specifications, and that what you&#8217;re getting from them is secure. So before you integrate that, or as you&#8217;re integrating that into your overall system, you should do some white-box testing to make sure this component you get for instance, only has the inputs you specify, and the outputs you specify. There&#8217;s no extraneous data going through that component or originating from that component.</p>
<p>That would be an example of when we would do a white box penetration test for systems integration. Also, a white box penetration test typically includes a gray box and a black box because as we&#8217;re going through this process, and we&#8217;re looking at what&#8217;s being developed, we often do the test from both the aspect of unauthenticated and user-level access, which is gray. The threats we emulate for a white box, typically we&#8217;re trying to discover poor coding practices. A white box perpetration test, as I mentioned, is typically performed during software development. This is the prime time to discover a input validation problem or a balance checking problem. The perfect opportunity is during the development.</p>
<p>As I mentioned earlier, if we wait to hire the penetration testing team until after development&#8217;s done, and they find out we have a problem such as a input validation or a buffer overflow attack that our software allows to happen because of a vulnerability, that is much more costly to fix than if we could have identified it upfront. The other threat that the white box penetration test helps with is any issues in the supply chain. As I mentioned earlier, we often do white box penetration tests to a systems integrator, so if one of your suppliers in the supply chain has a vulnerability that is introduced somewhere along the supply chain, and that component makes it into your overall system, this is the perfect opportunity to test this before it&#8217;s released again, out to your customers.</p>
<p>If you have any questions about white box penetration testing, you can leave them as a comment beneath this video. If you&#8217;re interested in a white box penetration test, you can contact us at www.alpinesecurity.com. I hope you enjoyed this video, and I&#8217;ll talk to you later on. Cheers.</p>
<p><!--HubSpot Call-to-Action Code --><span id="hs-cta-wrapper-94f60ee8-4fbe-483b-8a0f-ad83ab12a665" class="hs-cta-wrapper"><span id="hs-cta-94f60ee8-4fbe-483b-8a0f-ad83ab12a665" class="hs-cta-node hs-cta-94f60ee8-4fbe-483b-8a0f-ad83ab12a665"><!-- [if lte IE 8]>


<div id="hs-cta-ie-element"></div>


<![endif]--><a href="https://cta-redirect.hubspot.com/cta/redirect/7462611/94f60ee8-4fbe-483b-8a0f-ad83ab12a665" target="_blank" rel="noopener"><img decoding="async" id="hs-cta-img-94f60ee8-4fbe-483b-8a0f-ad83ab12a665" class="hs-cta-img" style="border-width: 0px;" src="https://no-cache.hubspot.com/cta/default/7462611/94f60ee8-4fbe-483b-8a0f-ad83ab12a665.png" alt="Check Out The Smartest Person in The Room" /></a></span><script charset="utf-8" src="https://js.hscta.net/cta/current.js"></script><script type="text/javascript"> hbspt.cta.load(7462611, '94f60ee8-4fbe-483b-8a0f-ad83ab12a665', {"useNewLoader":"true","region":"na1"}); </script></span><!-- end HubSpot Call-to-Action Code --></p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='White Box Penetration Testing Explained' data-link='https://christianespinosa.com/blog/white-box-penetration-testing-explained/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='White Box Penetration Testing Explained' data-link='https://christianespinosa.com/blog/white-box-penetration-testing-explained/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/white-box-penetration-testing-explained/">White Box Penetration Testing Explained</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/white-box-penetration-testing-explained/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Cybersecurity Status Quo Needs to Change</title>
		<link>https://christianespinosa.com/blog/the-cybersecurity-status-quo-needs-to-change/</link>
					<comments>https://christianespinosa.com/blog/the-cybersecurity-status-quo-needs-to-change/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Tue, 21 Jul 2020 12:55:40 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[chaneg]]></category>
		<category><![CDATA[christian espinosa]]></category>
		<category><![CDATA[crazy ones]]></category>
		<category><![CDATA[cybersecurity status quo]]></category>
		<category><![CDATA[steve jobs]]></category>
		<category><![CDATA[video]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2063</guid>

					<description><![CDATA[<p>This is a transcript of the video at the bottom of the post. In 1997, Apple came out with the commercial Here&#8217;s to the Crazy Ones. 20 plus years later, that commercial still resonates with me. Steve Jobs came up with a lot of the material for that commercial based on his life. He always [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/the-cybersecurity-status-quo-needs-to-change/">The Cybersecurity Status Quo Needs to Change</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='The Cybersecurity Status Quo Needs to Change' data-link='https://christianespinosa.com/blog/the-cybersecurity-status-quo-needs-to-change/' data-app-id-name='category_above_content'></div><p><img loading="lazy" decoding="async" class="alignright wp-image-2329 " src="https://christianespinosa.com/wp-content/uploads/2020/07/challenge-status-quo-christian-espinosa.png" alt="cybersecurity certifications" width="440" height="245" data-wp-editing="1" /><em>This is a transcript of the video at the bottom of the post.</em></p>
<p>In 1997, Apple came out with the commercial Here&#8217;s to the Crazy Ones. 20 plus years later, that commercial still resonates with me. Steve Jobs came up with a lot of the material for that commercial based on his life. He always felt like he didn&#8217;t quite fit in or was a misfit. He felt like he wanted to challenge the status quo. He also was called crazy a lot for dreaming too big, but instead of trying to follow the status quo or fit in, he embraced his uniqueness and ended up changing the world and having a huge impact. I feel the same way about cybersecurity, because, with cybersecurity, there is a status quo, this movement that we just keep following, but it&#8217;s not helping. A lot of people would call me crazy for wanting to challenge the status quo, but the status quo was not working.</p>
<p>And we know this. There&#8217;s plenty of evidence of this because of the different data breaches every day. One of the reasons the status quo is not working, or I believe it&#8217;s the primary reason is we&#8217;ve overly complicated cybersecurity. Instead of focusing on a few things and doing those few things very well, that few things that will reduce the risk the most, we try to get everyone to do hundreds of things. We can&#8217;t do hundreds of things very well, and what happens is we ended up doing them all half-assed, really.</p>
<p>I used to work with this guy and I always think of this scenario. I used to work with him and he was working these two projects once, and he was having a little bit of trouble figuring out which one took priority or which one took precedence. So he went and asked his boss, which one of these two projects takes priority? His boss told him they&#8217;re both an equal priority. His response was, &#8220;Okay. Well, I guess I&#8217;ll do both of them half-assed.&#8221; It&#8217;s the same concept as cybersecurity. If we try to do too many things, we ended up doing them half-assed. We should focus on just a few things and do them very well. Most data breaches are caused by a misconfiguration or an unpatched system. These are two simple things to fix, but you can&#8217;t focus on those things if you&#8217;re focusing on the other 98 stuff, 98 items that don&#8217;t really matter. This time, we challenge the cybersecurity status quo. What we&#8217;re doing is not working. We need to think different, as Apple would say. Here&#8217;s to the crazy ones.</p>
<p>Here&#8217;s to the crazy ones, the misfits, the rebels, the troublemakers, the round pegs in the square holes, the ones who see things differently. They&#8217;re not fond of rules and they have no respect for the status quo. You can quote them, disagree with them, glorify, or vilify them. About the only thing you can&#8217;t do is ignore them because they change things. They push the human race forward. And while some may see them as the crazy ones, we see genius, because the people who are crazy enough to think they can change the world are the ones who do.</p>
<p><iframe title="The Cybersecurity Status Quo Needs to Change" width="500" height="281" src="https://www.youtube.com/embed/g_WGCCDt4yU?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='The Cybersecurity Status Quo Needs to Change' data-link='https://christianespinosa.com/blog/the-cybersecurity-status-quo-needs-to-change/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='The Cybersecurity Status Quo Needs to Change' data-link='https://christianespinosa.com/blog/the-cybersecurity-status-quo-needs-to-change/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/the-cybersecurity-status-quo-needs-to-change/">The Cybersecurity Status Quo Needs to Change</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/the-cybersecurity-status-quo-needs-to-change/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cybersecurity &#8220;Professionals&#8221; &#8211; Reboot Needed</title>
		<link>https://christianespinosa.com/blog/cybersecurity-professionals-reboot-needed/</link>
					<comments>https://christianespinosa.com/blog/cybersecurity-professionals-reboot-needed/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Tue, 21 Jul 2020 09:55:39 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[change]]></category>
		<category><![CDATA[christian espinosa]]></category>
		<category><![CDATA[cybersecurity certifications]]></category>
		<category><![CDATA[Paper Tigers]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2060</guid>

					<description><![CDATA[<p>Introduction The cybersecurity industry is broken. What we have very loosely defined as a cybersecurity “professional” is not cutting it. The organizations that need cybersecurity deserve better. This article focuses on cybersecurity certifications, yet addresses a larger issue with the overall cybersecurity industry – stringent license requirements, as opposed to certification exams that can be [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/cybersecurity-professionals-reboot-needed/">Cybersecurity &#8220;Professionals&#8221; &#8211; Reboot Needed</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Cybersecurity &quot;Professionals&quot; - Reboot Needed' data-link='https://christianespinosa.com/blog/cybersecurity-professionals-reboot-needed/' data-app-id-name='category_above_content'></div><div id="block-yui_3_17_2_1_1580578155479_26156" class="sqs-block html-block sqs-block-html" data-block-type="2">
<div class="sqs-block-content">
<p><img loading="lazy" decoding="async" class="alignright wp-image-2329 " src="https://christianespinosa.com/wp-content/uploads/2020/07/image-asset.jpeg" alt="cybersecurity certifications" width="440" height="245" data-wp-editing="1" /></p>
<h2>Introduction</h2>
<p class="">The cybersecurity industry is broken. What we have very loosely defined as a cybersecurity “professional” is not cutting it. The organizations that need cybersecurity deserve better.</p>
<p class="">This article focuses on cybersecurity certifications, yet addresses a larger issue with the overall cybersecurity industry – stringent license requirements, as opposed to certification exams that can be easily “gamed”.</p>
<h2>Cybersecurity Certification Trend</h2>
<p class="">I’ve noticed a trend that seems to be getting worse.</p>
<p class="">The trend is this:</p>
<p class=""><strong><em>Fewer people seem to care about the cybersecurity profession – they just want to learn what’s on a certification test so they can get “certified” and get a high-paying cushy job where no one holds them accountable.</em></strong></p>
<p class="">This trend bothers me in a number of ways:</p>
<ol data-rte-list="default">
<li>
<p class=""><strong>Cybercriminals are winning</strong>. Cybercriminals, at least the good ones, take their trade seriously. Otherwise, they’d get caught more often. Many certified cybersecurity professionals, the “good guys”, are not really professionals anymore – they don’t take their trade seriously. This is the primary reason the cybercriminals are winning.</p>
</li>
<li>
<p class=""><strong>It’s apparent the “instant gratification” wave is here.</strong> Many people don’t want to put in the effort to learn a trade anymore. They just want to study the bare minimum, pass a certification exam, get hired, then fake it at a job as long as possible.</p>
</li>
<li>
<p class=""><strong>B Players hire C Players. C Players hire D Players</strong>. We’ve ended up with an industry filled with C and D players. Certified people that don’t really know what they are doing can’t make proper hiring decisions and, most of the time, let their ego get in the way. Their ego prevents them from hiring someone “smarter” than them; a new hire that actually knows what they are doing might find out that the person that hired them doesn’t know much, and has been faking it.</p>
</li>
<li>
<p class=""><strong>Inflated salaries.</strong> Salaries for people that have a certification (such as the Security+), no experience, are <a href="https://christianespinosa.com/blog/cybersecurity-paper-tigers-are-killing-us/" target="_blank" rel="noopener noreferrer">paper tigers</a>, and could care less about cybersecurity are grossly inflated. This perpetuates the problem, as the lure of money attracts people, like moths to a flame, to a career field that they have no passion for and, therefore will not develop skill towards.</p>
</li>
<li>
<p class=""><strong>Cybersecurity certification classes.</strong> People that just want to pass the test are not ideal students and are difficult to deal with as a trainer. They constantly ask “is that on the test?” and say things like “why are we learning that, if it’s not on the test?”. I often wonder if certification courses are helping or hurting the industry. <a href="https://alpinesecurity.com/" target="_blank" rel="noopener noreferrer">Alpine Security’s</a> trainers are awesome and really enjoy helping people that want to learn, pass the exam, and make a difference, but it is demoralizing, draining, and damn-right frustrating dealing with people that don’t care about cybersecurity and just want to pass an exam though.</p>
</li>
</ol>
<h2>Who “just wants to pass” the certification exam?</h2>
<p class="">There are two main categories.</p>
<ol>
<li>People that heard cybersecurity pays well, just want to make money, and don’t care about the industry or profession.</li>
<li>People that are mandated by their employer to have a cybersecurity certification for their job. This could be private or public sector.</li>
</ol>
<h2>Solutions</h2>
<p class="">I can’t point out a challenge, without offering some solutions…</p>
<h3>Licensing Requirements</h3>
<p class="">Add licensing requirements for cybersecurity professionals. Many cybersecurity professionals protect your health records (PHI), intellectual property, and sensitive data (PHI – credit card data, date of birth, SSN, etc.). Just about every other industry has federal and state licensing requirements. If a barber needs a license to cut your hair, shouldn’t a cybersecurity professional? A cybersecurity professional protects your identity and medical records and may also be responsible for securing a hospital network and the life-sustaining medical device connected to your grandmother.</p>
<p class="">Cybersecurity has no license requirements. If I want to become a “Cybersecurity Analyst”, I don’t need a license. I can just start promoting myself as such, study brain dumps or exam crams, pass a few cybersecurity certification tests, become the “expert”, and provide ineffective cybersecurity for my organization.</p>
</div>
</div>
<div id="block-yui_3_17_2_1_1580577947558_182544" class="sqs-block html-block sqs-block-html" data-block-type="2">
<div class="sqs-block-content">
<p class=""><img loading="lazy" decoding="async" class="lazyloaded alignright wp-image-3130 size-full" src="https://1kggaz45g7tf2360kdj0h7g1-wpengine.netdna-ssl.com/wp-content/uploads/2020/02/licensedbarber.jpg" sizes="(max-width: 300px) 100vw, 300px" srcset="https://1kggaz45g7tf2360kdj0h7g1-wpengine.netdna-ssl.com/wp-content/uploads/2020/02/licensedbarber.jpg 300w, https://1kggaz45g7tf2360kdj0h7g1-wpengine.netdna-ssl.com/wp-content/uploads/2020/02/licensedbarber-206x137.jpg 206w" alt="cybersecurity certifications licensing" width="300" height="200" data-lazy-srcset="https://1kggaz45g7tf2360kdj0h7g1-wpengine.netdna-ssl.com/wp-content/uploads/2020/02/licensedbarber.jpg 300w, https://1kggaz45g7tf2360kdj0h7g1-wpengine.netdna-ssl.com/wp-content/uploads/2020/02/licensedbarber-206x137.jpg 206w" data-lazy-sizes="(max-width: 300px) 100vw, 300px" data-lazy-src="https://1kggaz45g7tf2360kdj0h7g1-wpengine.netdna-ssl.com/wp-content/uploads/2020/02/licensedbarber.jpg" data-was-processed="true" /></p>
<p class="">For comparison’s sake, let’s look at the licensing requirements to become a barber. A barber license is required in all 50 US states to work as a barber. The barber license requirements vary by state, so I’ll just pick one for comparison to a cybersecurity analyst. I’ll go with Arkansas because I grew up there from age 12-18. Here are Arkansas’s Barber License requirements (<a href="https://www.barber-license.com/arkansas/">https://www.barber-license.com/arkansas/</a>):</p>
<p class=""><em>Step 1. Complete a Barber Education Program</em></p>
<p class="">As a candidate for an Arkansas barber license that has not been licensed in other states, you must first complete a formal barber program that is at least <strong>1,500 hours in duration</strong>.</p>
<p class=""><em>Step 2. Apply for an Arkansas Barber Technician Certification</em></p>
<p class="">The Board issues barber technician certifications for students who have <strong>completed at least 20 full working days of study in an approved school of barbering and at least 20 hours of study in the sterilization of tools and the barber laws of the State of Arkansas.</strong></p>
<p class=""><em>Step 3. Apply for an Arkansas Barber License and Take the Required Examinations</em></p>
<p class="">Once you have completed the required barber program, you must apply for a barber license at least 10 days before the date of the next barber examination. The Board furnishes all applicants with the appropriate forms.</p>
<p class="">The barber examinations include both a<strong> practical demonstration and a written and oral test. </strong>You must submit a completed application, along with a certification of your completed barber school hours, before you are eligible to participate in the examination process.</p>
<p class=""><em>Step 4. Learn About Job Opportunities in Barbering and Keep your Arkansas Barber License Current</em></p>
<p class="">Your Arkansas barber license must be renewed every odd-numbered year, before your birth date. There are currently no continuing education requirements for licensed barbers in Arkansas.</p>
<p class=""><strong>So, to sum it up, to be a barber in Arkansas, you need:</strong></p>
<ul>
<li>1500 hours of training. This is the equivalent of 37.5 forty-hour weeks.</li>
<li>20 FULL working days of study in an approved barber school</li>
<li>20 hours of sterilization training</li>
<li>Pass required exams (plural):
<ul>
<li style="text-align: left;">Practical demonstration</li>
<li style="text-align: left;">Written Test</li>
<li style="text-align: left;">Oral Test</li>
</ul>
</li>
</ul>
<p class=""><strong>To become a cybersecurity expert in ANY state in the US, you need:</strong></p>
<ul data-rte-list="default">
<li>
<p class=""><em>This section intentionally left blank…</em></p>
</li>
</ul>
<p class="">If licensing requirements are tied to risk, it seems the risk is greater with cybersecurity professionals. I mean I certainly don’t want to get a bad haircut from an unlicensed barber. But, I’ll take the bad haircut any day over an unskilled paper tiger not securing the medical device that is providing life support to my grandmother in the hospital.</p>
</div>
</div>
<div id="block-yui_3_17_2_1_1580577947558_201892" class="sqs-block image-block sqs-block-image sqs-col-3 span-3 float float-right sqs-text-ready" data-block-type="5">
<div id="yui_3_17_2_1_1582159060178_391" class="sqs-block-content">
<div id="yui_3_17_2_1_1582159060178_390" class="image-block-outer-wrapper layout-caption-below design-layout-inline combination-animation-none individual-animation-none individual-text-animation-none sqs-narrow-width">
<div id="yui_3_17_2_1_1582159060178_389" class="intrinsic">
<div class="image-caption-wrapper">
<div class="image-caption">
<div id="attachment_3131" class="wp-caption alignright">
<p><img loading="lazy" decoding="async" class="size-full wp-image-3131 lazyloaded" src="https://1kggaz45g7tf2360kdj0h7g1-wpengine.netdna-ssl.com/wp-content/uploads/2020/02/cybersecuritypapertigers.jpg" sizes="(max-width: 300px) 100vw, 300px" srcset="https://1kggaz45g7tf2360kdj0h7g1-wpengine.netdna-ssl.com/wp-content/uploads/2020/02/cybersecuritypapertigers.jpg 300w, https://1kggaz45g7tf2360kdj0h7g1-wpengine.netdna-ssl.com/wp-content/uploads/2020/02/cybersecuritypapertigers-206x137.jpg 206w" alt="" width="300" height="199" aria-describedby="caption-attachment-3131" data-lazy-srcset="https://1kggaz45g7tf2360kdj0h7g1-wpengine.netdna-ssl.com/wp-content/uploads/2020/02/cybersecuritypapertigers.jpg 300w, https://1kggaz45g7tf2360kdj0h7g1-wpengine.netdna-ssl.com/wp-content/uploads/2020/02/cybersecuritypapertigers-206x137.jpg 206w" data-lazy-sizes="(max-width: 300px) 100vw, 300px" data-lazy-src="https://1kggaz45g7tf2360kdj0h7g1-wpengine.netdna-ssl.com/wp-content/uploads/2020/02/cybersecuritypapertigers.jpg" data-was-processed="true" /></p>
<p id="caption-attachment-3131" class="wp-caption-text">
</div>
<p class="">Certified cybersecurity paper tiger</p>
</div>
</div>
</div>
</div>
</div>
</div>
<div id="block-yui_3_17_2_1_1580577947558_202184" class="sqs-block html-block sqs-block-html" data-block-type="2">
<div class="sqs-block-content">
<h3>Make cybersecurity certifications practical-based</h3>
<p class="">This gets rid of <a href="https://christianespinosa.com/blog/cybersecurity-paper-tigers-are-killing-us/" target="_blank" rel="noopener noreferrer">cybersecurity paper tigers</a>. You generally can’t pass a practical unless you know what you are doing. EC-Council is taking this approach with CEH Master. Licensing requirements would fix this too.</p>
<h3>Industry leaders need to step up and put purpose before profit</h3>
<p class="">At Alpine Security, we are making an effort to attract our ideal students and repel the others. This is a bit risky, as we are a business and need to generate revenue. I cannot, however, in good conscience support a broken system that hurts the cybersecurity industry and those the industry support. I’ve thought about pulling Alpine Security out of the cybersecurity certification training business altogether. This only hurts the students and professionals that actually care though, as I believe we offer outstanding training with trainers that are passionate about cybersecurity.</p>
<h2>Downsides of Changing the Status Quo</h2>
<p class="">I know, I know…but, what about the cybersecurity skills shortage…the skills gap we hear about incessantly every day? Won’t licensing requirements, practical exams, etc., make this worse?</p>
<p class="">Not really.</p>
<p class="">The “skills gap” primarily exists because cybersecurity is considered “white collar” (an antiquated term), where a college degree (any degree) matters. As if a college degree in political science or history makes a person qualified for a cybersecurity job? Really? I’d rather take someone “blue-collar” that has gone through 1500 hours of focused cybersecurity training, an apprenticeship, and passed a practical, written, and oral exam.</p>
<p class="">Yeah, but that’s 1500 hours? Isn’t that a lot? True, but a 4-year college degree is more than 1500 hours of time (mostly wasted) and a hell of a lot more money.</p>
<p class="">As for the skills gap, I’d rather have one person that is a professional, is passionate about what they are doing, and has a license in cybersecurity, than 15-20 people that are paper tigers.</p>
<p class="">One real tiger can easily take out 15-20 paper ones. I don’t know what the <strong><em>real</em></strong> cybersecurity skills gap number supposedly is, but if we divide it by 15-20, it isn’t that big of a deal.</p>
<p class="">What we are doing now, the status quo is not working. It’s time for a change.</p>
<h2>Conclusion</h2>
<p class="">I don’t have all the answers, but I think it’s worth opening the dialog and working to address this cybersecurity “professional” challenge, rather than pretending it doesn’t exist. Perhaps cybersecurity licensing requirements are the solution. I am willing to commit some of my time to make this happen. Alpine Security will also be more selective of students. Our goal is to help the industry and our clients, not contribute to the problems in our industry.</p>
<p class="">Here’s a simple list we developed to attract the right students and repel the rest for Alpine Security’s cybersecurity training:</p>
</div>
</div>
<div>
<div>
<h3>Not a good fit for Alpine Security’s training:</h3>
<ul>
<li>Think of what you do for work as a job, rather than a career</li>
<li>Have a fixed-mindset</li>
<li>Make decisions based on your ego, rather than what is right and adds value</li>
<li>Are lazy and value short-cuts</li>
</ul>
</div>
</div>
<div>
<div>
<h3>Good fit for Alpine Security’s training:</h3>
<ul>
<li>Believe in a career, not a job</li>
<li>Have a growth-mindset</li>
<li>Want to make a positive difference</li>
<li>Willing to put in the time to learn a trade and become a true professional</li>
</ul>
<p>Check out <a href="https://alpinesecurity.com/training/schedule/" target="_blank" rel="noopener noreferrer">Alpine Security&#8217;s Training Schedule</a>.</p>
</div>
</div>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Cybersecurity &quot;Professionals&quot; - Reboot Needed' data-link='https://christianespinosa.com/blog/cybersecurity-professionals-reboot-needed/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Cybersecurity &quot;Professionals&quot; - Reboot Needed' data-link='https://christianespinosa.com/blog/cybersecurity-professionals-reboot-needed/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/cybersecurity-professionals-reboot-needed/">Cybersecurity &#8220;Professionals&#8221; &#8211; Reboot Needed</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/cybersecurity-professionals-reboot-needed/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Are You Caught in the Success Trap?</title>
		<link>https://christianespinosa.com/blog/are-you-caught-in-the-success-trap/</link>
					<comments>https://christianespinosa.com/blog/are-you-caught-in-the-success-trap/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Mon, 20 Jul 2020 17:57:12 +0000</pubDate>
				<category><![CDATA[Leadership]]></category>
		<category><![CDATA[christian espinosa]]></category>
		<category><![CDATA[fulfillment]]></category>
		<category><![CDATA[success]]></category>
		<category><![CDATA[success trap]]></category>
		<category><![CDATA[video]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2056</guid>

					<description><![CDATA[<p>This post is a transcript of the video at the end of this post. I was at a Tony Robbins event, maybe five or six years ago, where Tony said, &#8220;Success without fulfillment is the ultimate failure.&#8221; A lot of us fall into this thing that I call the success trap. This means we&#8217;ve achieved [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/are-you-caught-in-the-success-trap/">Are You Caught in the Success Trap?</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Are You Caught in the Success Trap?' data-link='https://christianespinosa.com/blog/are-you-caught-in-the-success-trap/' data-app-id-name='category_above_content'></div><p><img loading="lazy" decoding="async" class="alignright wp-image-2329 " src="https://christianespinosa.com/wp-content/uploads/2020/07/success-ttrap.jpg" alt="cybersecurity certifications" width="440" height="245" data-wp-editing="1" /><em>This post is a transcript of the video at the end of this post.</em></p>
<p>I was at a Tony Robbins event, maybe five or six years ago, where Tony said, &#8220;Success without fulfillment is the ultimate failure.&#8221; A lot of us fall into this thing that I call the success trap. This means we&#8217;ve achieved success, at least according to how society defines success, but we&#8217;re unfulfilled and we feel trapped. I think a lot of us fall into this area. This means you may have a job you don&#8217;t particularly like, but you&#8217;ve been doing it for 10 or maybe 15 years. So you feel vested or invested in this career. And you&#8217;ve built up a decent pay structure over these 10 or 15 years. Then you&#8217;ve bought a house that you are barely able to afford. Or maybe as you got a new pay raise or promotion, you bought a bigger house. You have a nice car. You have a nice family.</p>
<p>This video excerpt from <a href="https://en.wikipedia.org/wiki/Up_in_the_Air_(2009_film)" target="_blank" rel="noopener noreferrer">Up in the Air</a>, says it well:</p>
<p><iframe title="Up in the Air (3/9) Movie CLIP - How Much Did They Pay You to Give Up on Your Dreams? (2009) HD" width="500" height="281" src="https://www.youtube.com/embed/TkX-TPaodoM?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>So you look very successful from the outside, but inside you&#8217;re empty and unfulfilled and you feel trapped. The longer in this success trap, as I mentioned, the harder it is to get out. And that&#8217;s primarily due to people&#8217;s mindset. The idea that keeps you in this trap is if I&#8217;ve been at this career for 10 or 15 years, I&#8217;ve invested this amount of time in that career. So if I switched careers to do something that I really want to do, you&#8217;re going to have to take a step backward, is how a lot of people perceive it, rather than taking a different step. It&#8217;s worth asking yourself, &#8220;Is a little bit of discomfort to switch careers or to make less money worth your sanity?&#8221;</p>
<p>And a lot of people, if they&#8217;re in this trap too long, they get out of it. But often not in a pretty way. Some people have a midlife crisis where they just have had enough of the trap and they no longer want to be a lawyer, for instance. They&#8217;re going to now become a skydiving instructor or whatever. Some people get addicted to drugs and alcohol or sex, or they have some addictive behavior that&#8217;s typically tied to being in that success trap. Some people will actually go as far as killing themselves.</p>
<p>Robin Williams is an example of this. He was very successful, but he wasn&#8217;t fulfilled. Kurt Cobain, many celebrities, they have this happen to them. They&#8217;re very successful, but they&#8217;re not fulfilled. It&#8217;s important that what you&#8217;re doing with the majority of your time every day aligns with who you are and where you want to go. And it&#8217;s never too late to get out of that trap. The sooner you can get out of the success trap and live a life of fulfillment, the better because you will be more centered and your achievements will be in alignment with who you are.</p>
<p>I realize it takes courage. There&#8217;s going to be some risk involved to get out of the success trap. But I feel it&#8217;s extremely important, especially for people&#8217;s mental health. One of the biggest shifts that will benefit you is to shift your mindset. Just because your friends or your family think you&#8217;re successful if you don&#8217;t feel fulfilled and you want to do something else who gives a shit, what they think about it? It&#8217;s your life. You&#8217;re the only one that can tell if you&#8217;re fulfilled. They can&#8217;t.</p>
<p>And I know there&#8217;s a lot of peer pressure about playing a safe and having a stable job. But if you&#8217;re miserable, what is it really costing you? You&#8217;ll be much happier, probably having a job, making less money, maybe even living in a smaller house, maybe driving a less expensive car. If you&#8217;re living something more in alignment with your purpose.</p>
<p>I&#8217;ve talked to many people over my career. Many people I&#8217;ve met at events, many people that I&#8217;ve known that have had this high paying job. They&#8217;ve had all these nice things they look successful. But then they did decide to take a step in a different direction. They let all these things go. They have fewer things over here. But they&#8217;re much happier because they&#8217;re living a life that&#8217;s intentional and is in alignment with what they feel is their purpose, rather than what society feels or defines as success. So I encourage you to get out of the success trap. The sooner you can get out of it, the better.</p>
<p>I hope you found value in this video. If you are currently in the success trap or you&#8217;ve made it out of the success trap, please tell us a little bit about your story in the comments for this video. Have a great day.</p>
<p><iframe title="Are You Caught in the Success Trap?" width="500" height="281" src="https://www.youtube.com/embed/-vHvfvB4o3E?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Are You Caught in the Success Trap?' data-link='https://christianespinosa.com/blog/are-you-caught-in-the-success-trap/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Are You Caught in the Success Trap?' data-link='https://christianespinosa.com/blog/are-you-caught-in-the-success-trap/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/are-you-caught-in-the-success-trap/">Are You Caught in the Success Trap?</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/are-you-caught-in-the-success-trap/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Hero&#8217;s 2 Journeys &#8211; Achievement &#038; Transformation</title>
		<link>https://christianespinosa.com/blog/the-heros-2-journeys-achievement-transformation/</link>
					<comments>https://christianespinosa.com/blog/the-heros-2-journeys-achievement-transformation/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Wed, 15 Jul 2020 09:35:14 +0000</pubDate>
				<category><![CDATA[Leadership]]></category>
		<category><![CDATA[achievement]]></category>
		<category><![CDATA[christian espinosa]]></category>
		<category><![CDATA[hero's 2 journeys]]></category>
		<category><![CDATA[transformation]]></category>
		<category><![CDATA[video]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2049</guid>

					<description><![CDATA[<p>This blog post is a transcript from the video at the bottom of the post. Pretty much for any endeavor or goal, we try to achieve in life, there are two journeys we&#8217;re on. I first heard of these two journeys, I think, from this book called The Hero&#8217;s 2 Journeys. It&#8217;s also a course [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/the-heros-2-journeys-achievement-transformation/">The Hero&#8217;s 2 Journeys &#8211; Achievement &#038; Transformation</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='The Hero&#039;s 2 Journeys - Achievement &amp; Transformation' data-link='https://christianespinosa.com/blog/the-heros-2-journeys-achievement-transformation/' data-app-id-name='category_above_content'></div><p><img loading="lazy" decoding="async" class="alignright wp-image-2329 " src="https://christianespinosa.com/wp-content/uploads/2020/07/The-Hero’s-2-Journeys-–-Achievement-Transformation.png" alt="cybersecurity certifications" width="440" height="245" data-wp-editing="1" /><em>This blog post is a transcript from the video at the bottom of the post.</em></p>
<p>Pretty much for any endeavor or goal, we try to achieve in life, there are two journeys we&#8217;re on. I first heard of these two journeys, I think, from this book called <a href="https://www.amazon.com/Heros-2-Journeys-Michael-Hauge/dp/1880717476" target="_blank" rel="noopener noreferrer">The Hero&#8217;s 2 Journeys</a>. It&#8217;s also a course by Michael Hauge and Chris Vogler. But these two journeys are critical to storytelling, but they&#8217;re true to life as well. And that&#8217;s why with storytelling, they help so much, because people want a story that relates to real life. The two journeys are the <strong>outer journey</strong> and the<strong> inner journey</strong>. So if you&#8217;re pursuing something and it&#8217;s a massive goal, from the outside, people can see the steps you&#8217;re taking. They can see the things that didn&#8217;t work. They can see your journey towards that goal. So if this is a cybersecurity certification, they can see the studying you&#8217;re putting in, the videos you&#8217;re watching, the bootcamp you take. They can see all the activities. So that&#8217;s one of those hero&#8217;s journeys, and it doesn&#8217;t have to be a hero&#8217;s journey, it is just called the hero&#8217;s journey.</p>
<p>The second one, which is more important, is the inner journey. So the first one I described as the outer journey, the one everyone can see as you&#8217;re moving towards some goal or achievement. The inner journey though is what&#8217;s really important. That&#8217;s the transformation you make along the way. So how you change internally, how your belief system changes, how your identity changes, et cetera, et cetera. Because in order to achieve your goal, if it&#8217;s a big goal, you may have to change internally to become a different person capable of achieving that goal. So that&#8217;s the second journey, and that&#8217;s the transformation. So really, if you want to think about the two journeys, there&#8217;s the <strong>journey of achievement, which is external</strong>, and there&#8217;s the<strong> journey of transformation, which is internal</strong>. And for any good story, we need these two elements.</p>
<p>Because I think a lot about how this applies to life, for life, when you pursue something, people can see if you achieve it or not. But really what happens if you&#8217;re pursuing a new career, a new certification, a college degree, the most important part, and I think people lose focus of this sometimes, is the transformation of you through that process. Because often to achieve a higher goal, or if you set a higher standard for yourself, through that process, you become a better person or you develop different capabilities, or you change your belief system to support this new thing you&#8217;re trying to obtain. And sometimes through this journey, you may realize that this thing you&#8217;re trying to obtain, this achievement or goal, isn&#8217;t actually that important anymore. Because through this process, you&#8217;ve grown and figured out what really matters to you. That&#8217;s the transformation. I urge you if you&#8217;re pursuing a goal, to think not only about what you&#8217;re trying to achieve, but think about the journey you&#8217;re on, and how this changes you as a person.</p>
<p>&nbsp;</p>
<p><iframe title="Your 2 Journeys in Life - Achievement and Transformation" width="500" height="281" src="https://www.youtube.com/embed/6FceqTCiYjc?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='The Hero&#039;s 2 Journeys - Achievement &amp; Transformation' data-link='https://christianespinosa.com/blog/the-heros-2-journeys-achievement-transformation/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='The Hero&#039;s 2 Journeys - Achievement &amp; Transformation' data-link='https://christianespinosa.com/blog/the-heros-2-journeys-achievement-transformation/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/the-heros-2-journeys-achievement-transformation/">The Hero&#8217;s 2 Journeys &#8211; Achievement &#038; Transformation</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/the-heros-2-journeys-achievement-transformation/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How The Confidence Competence Loop Can Benefit You</title>
		<link>https://christianespinosa.com/blog/how-the-confidence-competence-loop-can-benefit-you/</link>
					<comments>https://christianespinosa.com/blog/how-the-confidence-competence-loop-can-benefit-you/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Tue, 14 Jul 2020 13:41:08 +0000</pubDate>
				<category><![CDATA[Leadership]]></category>
		<category><![CDATA[christian espinosa]]></category>
		<category><![CDATA[competence]]></category>
		<category><![CDATA[confidence]]></category>
		<category><![CDATA[confidence competence loop]]></category>
		<category><![CDATA[video]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2046</guid>

					<description><![CDATA[<p>This blog post is a transcription from the video at the bottom of the post. What is the confidence/competence loop? I&#8217;m Christian Espinosa with Alpine Security, and that&#8217;s the topic of this video, competence, confidence, and the loop that ties those two together. So confidence is our belief we can do something. Competence is the [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/how-the-confidence-competence-loop-can-benefit-you/">How The Confidence Competence Loop Can Benefit You</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='How The Confidence Competence Loop Can Benefit You' data-link='https://christianespinosa.com/blog/how-the-confidence-competence-loop-can-benefit-you/' data-app-id-name='category_above_content'></div><p><img loading="lazy" decoding="async" class="alignright wp-image-2329 " src="https://christianespinosa.com/wp-content/uploads/2020/07/The-Hero’s-2-Journeys-–-Achievement-Transformation-1.png" alt="cybersecurity certifications" width="440" height="245" data-wp-editing="1" /><em>This blog post is a transcription from the video at the bottom of the post.</em></p>
<p>What is the confidence/competence loop? I&#8217;m Christian Espinosa with Alpine Security, and that&#8217;s the topic of this video, competence, confidence, and the loop that ties those two together. So confidence is our belief we can do something. Competence is the ability we can do something. The confidence/competence loop means if we believe we can do something, we&#8217;ll actually take action to do it, which increases our competence, which then increases our confidence, which allows us to take more action.</p>
<p>So it&#8217;s sort of like the chicken and egg scenario because, without the initial confidence, we&#8217;re not likely to take a step to gain the competence. Without the confidence, we sort of step back in fear and we&#8217;re afraid we are not going to be competent. So we don&#8217;t take the action that&#8217;s required to become competent. That&#8217;s where the confidence/comes into play. The hardest part for most people is getting up over that initial fear.</p>
<p>Initially, when we start some sort of endeavor like the Security+ certification or anything in life that&#8217;s a challenge, we don&#8217;t have the confidence yet. So we have to get over the fear or put the fear aside and take the first step or the first action to build some competence, which will then increase our confidence. Once we get this cycle going, that will propel us forward to achieve the objective.</p>
<p>I&#8217;m really curious about your experience with the confidence/competence loop. Please note your experience if you&#8217;d like as a comment to this video. Also, please subscribe to our channel. You can click on the little bell as well to get notified when we have cool videos come out, actually notifies you when we have any video come out. So you can decide if they&#8217;re cool or not, but you&#8217;ll get notified when a new video comes out. Thanks for watching, and I hope this video helps you take that first step to become competent and then confident and spiral forward to achieve your goals.</p>
<p><iframe title="How The Confidence Competence Loop Can Benefit You" width="500" height="281" src="https://www.youtube.com/embed/7o-hHxKTzmI?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='How The Confidence Competence Loop Can Benefit You' data-link='https://christianespinosa.com/blog/how-the-confidence-competence-loop-can-benefit-you/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='How The Confidence Competence Loop Can Benefit You' data-link='https://christianespinosa.com/blog/how-the-confidence-competence-loop-can-benefit-you/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/how-the-confidence-competence-loop-can-benefit-you/">How The Confidence Competence Loop Can Benefit You</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/how-the-confidence-competence-loop-can-benefit-you/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
