<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>hacking Archives - Christian Espinosa</title>
	<atom:link href="https://christianespinosa.com/blog/tag/hacking/feed/" rel="self" type="application/rss+xml" />
	<link>https://christianespinosa.com/blog/tag/hacking/</link>
	<description>Bestselling Author &#124; Keynote Speaker &#124; Cybersecurity Expert</description>
	<lastBuildDate>Thu, 06 Apr 2023 16:46:12 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.1</generator>

<image>
	<url>https://christianespinosa.com/wp-content/uploads/2021/09/cropped-Christian-Espinosa-Blue-White-Logo-32x32.png</url>
	<title>hacking Archives - Christian Espinosa</title>
	<link>https://christianespinosa.com/blog/tag/hacking/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>3 Steps to Hide Data in an Image Using Steganography</title>
		<link>https://christianespinosa.com/blog/3-steps-to-hide-data-in-an-image-using-steganography/</link>
					<comments>https://christianespinosa.com/blog/3-steps-to-hide-data-in-an-image-using-steganography/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Sat, 04 Sep 2021 06:40:47 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[beyond compare]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[hiding]]></category>
		<category><![CDATA[jphide]]></category>
		<category><![CDATA[jpseek]]></category>
		<category><![CDATA[lilbub]]></category>
		<category><![CDATA[steganography]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2635</guid>

					<description><![CDATA[<p>In this post we&#8217;ll explain a simple method to hide data (any type of data &#8211; text, image, malware, etc.) in a JPEG. This is a form of steganography. Steganography is the art and science of hiding something in plain sight. Why hide something in plain sight &#8211; overtly hide something? To not tip anyone [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/3-steps-to-hide-data-in-an-image-using-steganography/">3 Steps to Hide Data in an Image Using Steganography</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='3 Steps to Hide Data in an Image Using Steganography' data-link='https://christianespinosa.com/blog/3-steps-to-hide-data-in-an-image-using-steganography/' data-app-id-name='category_above_content'></div><figure id="attachment_2636" aria-describedby="caption-attachment-2636" style="width: 355px" class="wp-caption alignright"><img fetchpriority="high" decoding="async" class=" wp-image-2636" src="https://christianespinosa.com/wp-content/uploads/2021/09/image-containing-steganography-300x168.jpg" alt="image-containing-steganography" width="355" height="199" srcset="https://christianespinosa.com/wp-content/uploads/2021/09/image-containing-steganography-300x168.jpg 300w, https://christianespinosa.com/wp-content/uploads/2021/09/image-containing-steganography.jpg 636w" sizes="(max-width: 355px) 100vw, 355px" /><figcaption id="caption-attachment-2636" class="wp-caption-text">Image containing a hidden file using steganography techniques</figcaption></figure>
<p>In this post we&#8217;ll explain a simple method to hide data (any type of data &#8211; text, image, malware, etc.) in a JPEG. This is a form of <a href="https://en.wikipedia.org/wiki/Steganography" target="_blank" rel="noopener noreferrer">steganography</a>. Steganography is the art and science of hiding something in plain sight. Why hide something in plain sight &#8211; overtly hide something? To not tip anyone off that there is a secret message or hidden data.</p>
<p class="" style="white-space: pre-wrap;">This post focuses on a technique, rather than a history lesson on steganography, so on to the gist&#8230;</p>
<h3 style="white-space: pre-wrap;">1. Download and extract the JPHS (JPEG Hide and JPEG Seek) tool:</h3>
<ul data-rte-list="default">
<li>
<p class="" style="white-space: pre-wrap;"><a href="http://linux01.gwdg.de/~alatham/stego.html" target="_blank" rel="noopener noreferrer">gwdg.de site</a></p>
</li>
</ul>
<h3 style="white-space: pre-wrap;">2. Download a cover image (the image you will hide the data inside of) and a hide image (the image you will hide inside the cover image):</h3>
<p class="" style="white-space: pre-wrap;">The cover image should be roughly 10 times the size of the hide image.  In our example, we will use a HD Background as the cover image and a picture of a cute kitten as the hide image.</p>
<ul data-rte-list="default">
<li>
<p class="" style="white-space: pre-wrap;">Cover Image &#8211; background.jpg (found doing a Google search for &#8220;hd backgrounds&#8221;):</p>
</li>
</ul>
<p><a href="https://alpinesecurity.com/wp-content/uploads/2020/02/steganography-cover-image.jpg"><img decoding="async" class="alignnone" src="https://alpinesecurity.com/wp-content/uploads/2020/02/steganography-cover-image.jpg" alt=" Source: http://hdgreatimages.com/wp-content/uploads/2016/04/Bridge-HD-Backgrounds.jpg " width="1920" height="1080" /></a> Source: http://hdgreatimages.com/wp-content/uploads/2016/04/Bridge-HD-Backgrounds.jpg</p>
<ul data-rte-list="default">
<li>
<p class="" style="white-space: pre-wrap;">Hide Image &#8211; kitten.jpg (found doing a Google search for &#8220;lilbub&#8221;):</p>
</li>
</ul>
<p><a href="https://alpinesecurity.com/wp-content/uploads/2020/02/lilbub-hide-file.jpg"><img decoding="async" class="alignnone" src="https://alpinesecurity.com/wp-content/uploads/2020/02/lilbub-hide-file.jpg" alt=" Source: https://pbs.twimg.com/profile_images/466984253255729152/8yMo8O4K.jpeg " width="512" height="512" /></a></p>
<p><a href="https://alpinesecurity.com/wp-content/uploads/2020/02/steganography-filesize.jpg"><img loading="lazy" decoding="async" class="alignnone" src="https://alpinesecurity.com/wp-content/uploads/2020/02/steganography-filesize.jpg" alt="jphide and jpseek" width="532" height="110" /></a></p>
<h3 style="white-space: pre-wrap;">3. Run Jphswin. Accept the terms. Do the following:</h3>
<p class="" style="white-space: pre-wrap;">Click on &#8220;Open jpeg&#8221;, select &#8220;background.jpg&#8221; and click &#8220;open&#8221;:</p>
<figure style="width: 545px" class="wp-caption alignnone"><a href="https://alpinesecurity.com/wp-content/uploads/2020/02/jphswin-input-file-selection.jpg"><img loading="lazy" decoding="async" src="https://alpinesecurity.com/wp-content/uploads/2020/02/jphswin-input-file-selection.jpg" alt=" Selecting the Input (Cover) file in JPHS for Windows " width="545" height="399" /></a><figcaption class="wp-caption-text">Selecting the Input (Cover) file in JPHS for Windows</figcaption></figure>
<p>&nbsp;</p>
<p class="" style="white-space: pre-wrap;">Click on &#8220;Hide&#8221;, enter a passphrase, click &#8220;OK&#8221;, then select the hide file (kitten.jpg), and click &#8220;Open&#8221;:</p>
<figure style="width: 528px" class="wp-caption alignnone"><a href="https://alpinesecurity.com/wp-content/uploads/2020/02/jphswin-hide-file.jpg"><img loading="lazy" decoding="async" src="https://alpinesecurity.com/wp-content/uploads/2020/02/jphswin-hide-file.jpg" alt=" Selecting the Hide file in JPHS for Windows " width="528" height="392" /></a><figcaption class="wp-caption-text">Selecting the Hide file in JPHS for Windows</figcaption></figure>
<p>&nbsp;</p>
<p class="" style="white-space: pre-wrap;">Save the steg&#8217;d file (the kitten.jpg file hidden in the background.jpg file) as another file name, so we can compare the new file containing the hidden data with the original file. Click &#8220;Save jpeg as&#8221; and use the file name &#8220;bridge.jpg&#8221; (or something different than the original name):</p>
<figure style="width: 534px" class="wp-caption alignnone"><a href="https://alpinesecurity.com/wp-content/uploads/2020/02/saving-hidden-file.jpg"><img loading="lazy" decoding="async" src="https://alpinesecurity.com/wp-content/uploads/2020/02/saving-hidden-file.jpg" alt=" Saving the Steg'd file in JPHS for Windows " width="534" height="383" /></a><figcaption class="wp-caption-text">Saving the Steg&#8217;d file in JPHS for Windows</figcaption></figure>
<p>&nbsp;</p>
<p class="" style="white-space: pre-wrap;">You should now see 3 files &#8211; the &#8220;background.jpg&#8221; should look the same (to the naked eye) as the &#8220;bridge.jpg&#8221; even though the &#8220;kitten.jpg&#8221; file is hidden inside &#8220;bridge.jpg&#8221;:</p>
<p><a href="https://alpinesecurity.com/wp-content/uploads/2020/02/3-files.jpg"><img loading="lazy" decoding="async" class="alignnone" src="https://alpinesecurity.com/wp-content/uploads/2020/02/3-files.jpg" alt="stego'd images" width="527" height="63" /></a></p>
<p class="" style="white-space: pre-wrap;">Open both &#8220;background.jpg&#8221; and &#8220;bridge.jpg&#8221; side-by-side in Windows Photo Viewer to see if you can tell a difference:</p>
<figure style="width: 1376px" class="wp-caption alignnone"><a href="https://alpinesecurity.com/wp-content/uploads/2020/02/original-next-to-steganography.jpg"><img loading="lazy" decoding="async" src="https://alpinesecurity.com/wp-content/uploads/2020/02/original-next-to-steganography.jpg" alt=" Original image on the left. Steg'd image on the right. Can you see any difference? " width="1376" height="584" /></a><figcaption class="wp-caption-text">Original image on the left. Steg&#8217;d image on the right. Can you see any difference?</figcaption></figure>
<p class="" style="white-space: pre-wrap;">Congratulations! You&#8217;ve just practiced steganography.</p>
<h2 style="white-space: pre-wrap;">Validation</h2>
<p class="" style="white-space: pre-wrap;">Let&#8217;s validate our steganography demonstration actually worked by extracting the &#8220;kitten.jpg&#8221; from the &#8220;bridge.jpg&#8221;:</p>
<p class="" style="white-space: pre-wrap;">Using JPHS for Windows, select &#8220;Open jpeg&#8221;, select &#8220;bridge.jpg&#8221;, click &#8220;Open&#8221;:</p>
<p>Opening the image containing the hidden file in JPHS for Windows</p>
<p class="" style="white-space: pre-wrap;">After you opened the &#8220;bridge.jpg&#8221; file click on &#8220;Seek&#8221;, enter the passphrase you used to hide the file, click &#8220;OK&#8221;, then save the hidden file as &#8220;secret.jpg&#8221;:</p>
<figure style="width: 534px" class="wp-caption alignnone"><a href="https://alpinesecurity.com/wp-content/uploads/2020/02/saving-hidden-file.jpg"><img loading="lazy" decoding="async" src="https://alpinesecurity.com/wp-content/uploads/2020/02/saving-hidden-file.jpg" alt=" Saving the hidden file as " width="534" height="383" /></a><figcaption class="wp-caption-text">Saving the hidden file as &#8220;secret.jpg&#8221; in JPHS for Windows</figcaption></figure>
<p>&nbsp;</p>
<p class="" style="white-space: pre-wrap;">Verify the &#8220;secret.jpg&#8221; file is the same as the &#8220;kitten.jpg&#8221; file by opening &#8220;secret.jpg&#8221;.</p>
<figure style="width: 564px" class="wp-caption alignnone"><a href="https://alpinesecurity.com/wp-content/uploads/2020/02/secret.jpg"><img loading="lazy" decoding="async" src="https://alpinesecurity.com/wp-content/uploads/2020/02/secret.jpg" alt=" The extracted image" width="564" height="655" /></a><figcaption class="wp-caption-text">The extracted &#8220;secret.jpg&#8221; is the same as &#8220;kitten.jpg&#8221;. Our steganography example worked!</figcaption></figure>
<p>&nbsp;</p>
<p class="" style="white-space: pre-wrap;">To validate which image pixels JPHS for Windows modified to hide the image in the cover image, you can use Beyond Compare to visually depict the differences. Download and install <a href="http://www.scootersoftware.com/" target="_blank" rel="noopener noreferrer">Beyond Compare</a>.  If you receive an &#8220;Error creating registry key:&#8221; you need to install as an Administrator.</p>
<p class="" style="white-space: pre-wrap;">Run Beyond Compare. On the left side, select &#8220;New&#8221;, the double-click &#8220;Picture Compare&#8221;:</p>
<figure style="width: 279px" class="wp-caption alignnone"><a href="https://alpinesecurity.com/wp-content/uploads/2020/02/beyond-compare-picture-compare.jpg"><img loading="lazy" decoding="async" src="https://alpinesecurity.com/wp-content/uploads/2020/02/beyond-compare-picture-compare.jpg" alt=" Double-click Picture Compare " width="279" height="312" /></a><figcaption class="wp-caption-text">Double-click Picture Compare</figcaption></figure>
<p>&nbsp;</p>
<p class="" style="white-space: pre-wrap;">Open the original picture (background.jpg) on the left window in Beyond Compare and open the steg&#8217;d picture (bridge.jpg) on the right window.  The comparison should be in the bottom window:</p>
<figure style="width: 1057px" class="wp-caption alignnone"><a href="https://alpinesecurity.com/wp-content/uploads/2020/02/beyond-comparison-pixel-differences.jpg"><img loading="lazy" decoding="async" src="https://alpinesecurity.com/wp-content/uploads/2020/02/beyond-comparison-pixel-differences.jpg" alt=" One example of where the pixels differ is shown above - the pixel on the left has RGB:47,109,184, on the right it is RGB:47,109,186 " width="1057" height="801" /></a><figcaption class="wp-caption-text">One example of where the pixels differ is shown above &#8211; the pixel on the left has RGB:47,109,184, on the right it is RGB:47,109,186</figcaption></figure>
<p>&nbsp;</p>
<h2 style="white-space: pre-wrap;">Resources</h2>
<p class="" style="white-space: pre-wrap;">Files used/referenced in this blog:</p>
<ul data-rte-list="default">
<li>
<p class="" style="white-space: pre-wrap;">JPHS for Windows (This application is included in the jphs_05.zip)</p>
</li>
<li>
<p class="" style="white-space: pre-wrap;"><a href="https://alpinesecurity.com/wp-content/uploads/2020/02/background.jpg" target="_blank" rel="noopener noreferrer">background.jpg</a></p>
</li>
<li>
<p class="" style="white-space: pre-wrap;"><a href="https://alpinesecurity.com/wp-content/uploads/2020/02/kitten.jpg" target="_blank" rel="noopener noreferrer">kitten.jpg</a></p>
</li>
<li>
<p class="" style="white-space: pre-wrap;"><a href="//alpinesecurity.wpengine.com/wp-content/uploads/2020/02/bridge.jpg" target="_blank" rel="noopener noreferrer">bridge.jpg</a></p>
</li>
<li>
<p class="" style="white-space: pre-wrap;"><a href="https://alpinesecurity.com/wp-content/uploads/2020/02/secret-1.jpg" target="_blank" rel="noopener noreferrer">secret.jpg</a></p>
</li>
</ul>
<div class=" summary-block-wrapper summary-block-collection-type-blog summary-block-setting-text-size-small summary-block-setting-text-align-left summary-block-setting-design-carousel summary-block-setting-design-list-thumbnail-left summary-block-setting-metadata-position-below-content summary-block-setting-primary-metadata-none summary-block-setting-secondary-metadata-none summary-block-setting-show-thumbnail summary-block-setting-show-title summary-block-setting-show-price summary-block-setting-hide-excerpt sqs-gallery-design-carousel ">
<div class="summary-item-list-container sqs-gallery-container">
<div class="summary-item-list sqs-gallery">
<div class=" summary-item summary-item-record-type-text sqs-gallery-design-carousel-slide summary-item-has-thumbnail summary-item-has-excerpt summary-item-has-cats summary-item-has-tags summary-item-has-author summary-item-has-comments-enabled ">
<div class="summary-content sqs-gallery-meta-container"><!-- Metadata (Below Content) --></div>
</div>
</div>
</div>
</div>
<div class="summary-metadata-container summary-metadata-container--below-content">
<div class="summary-metadata summary-metadata--primary">Video on this topic:</div>
<div>
<p><iframe title="Steganography: Hide Data in a .jpg Image" width="500" height="281" src="https://www.youtube.com/embed/Iepp_B__968?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
</div>
</div>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='3 Steps to Hide Data in an Image Using Steganography' data-link='https://christianespinosa.com/blog/3-steps-to-hide-data-in-an-image-using-steganography/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='3 Steps to Hide Data in an Image Using Steganography' data-link='https://christianespinosa.com/blog/3-steps-to-hide-data-in-an-image-using-steganography/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/3-steps-to-hide-data-in-an-image-using-steganography/">3 Steps to Hide Data in an Image Using Steganography</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/3-steps-to-hide-data-in-an-image-using-steganography/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Penetration Testing History</title>
		<link>https://christianespinosa.com/blog/penetration-testing-history/</link>
					<comments>https://christianespinosa.com/blog/penetration-testing-history/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Sat, 04 Sep 2021 05:49:25 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[tiger team]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2620</guid>

					<description><![CDATA[<p>Penetration testing, or “ethical hacking,” is a method of exposing and purposefully exploiting the security vulnerabilities of a company&#8217;s systems.  Unlike security tests that use automated programs to identify these vulnerabilities, penetration testing requires highly-trained specialists to analyze the system, find their weaknesses, and use them to access protected information. The human element of penetration [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/penetration-testing-history/">Penetration Testing History</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Penetration Testing History' data-link='https://christianespinosa.com/blog/penetration-testing-history/' data-app-id-name='category_above_content'></div><p style="white-space: pre-wrap; text-align: left;"><img loading="lazy" decoding="async" class=" wp-image-2621 alignright" src="https://christianespinosa.com/wp-content/uploads/2021/09/mika-baumeister-J5yoGZLdpSI-unsplash-300x200.jpg" alt="penetration testing - hoodie not required" width="363" height="241" srcset="https://christianespinosa.com/wp-content/uploads/2021/09/mika-baumeister-J5yoGZLdpSI-unsplash-300x200.jpg 300w, https://christianespinosa.com/wp-content/uploads/2021/09/mika-baumeister-J5yoGZLdpSI-unsplash-1024x684.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2021/09/mika-baumeister-J5yoGZLdpSI-unsplash-768x513.jpg 768w, https://christianespinosa.com/wp-content/uploads/2021/09/mika-baumeister-J5yoGZLdpSI-unsplash-1536x1026.jpg 1536w, https://christianespinosa.com/wp-content/uploads/2021/09/mika-baumeister-J5yoGZLdpSI-unsplash-2048x1368.jpg 2048w" sizes="(max-width: 363px) 100vw, 363px" />Penetration testing, or “ethical hacking,” is a method of exposing and purposefully exploiting the security vulnerabilities of a company&#8217;s systems.  Unlike security tests that use automated programs to identify these vulnerabilities, penetration testing requires highly-trained specialists to analyze the system, find their weaknesses, and use them to access protected information.</p>
<p style="white-space: pre-wrap;">The human element of penetration testing is the most important. While a computer program can only perform the tasks with which it has been programmed, a human being can analyze new information and think of solutions that haven&#8217;t been thought of before. What&#8217;s more, a human is able to <em>want</em> – to feel a drive and a motivation that fuels the search for a way in.</p>
<h2 style="white-space: pre-wrap; font-weight: 600; color: #02548a;">Penetration Testing History &#8211; A Timeline</h2>
<p style="white-space: pre-wrap;">The concept of penetration testing has been around since human beings first began trying to understand their enemies&#8217; thought processes. Ancient armies all over the world conducted mock battles and games to figure out how other armies might undermine their strategies or get around their forces. This continued for centuries upon centuries until, inevitably, the tech world got in on the act.</p>
<h3 style="white-space: pre-wrap; font-weight: 600; color: #02548a;">The Tiger Teams</h3>
<p style="white-space: pre-wrap;">Penetration testing first became a concept in the 1960s. The burgeoning tech industry realized then that having multiple users on one system, as had become the norm, posed an inherent risk to the system&#8217;s security.</p>
<p style="white-space: pre-wrap;">This realization gave rise to what became known as “Tiger Teams.” Unsurprisingly, the first of these worked for the government and military. In 1971, <a href="https://docs.huihoo.com/rsaconference/usa-2014/tech-w02-a-penetration-testing-model-v2.pdf">the US Air Force ordered security testing</a> of time-shared computer systems.</p>
<h3 style="white-space: pre-wrap; font-weight: 600; color: #02548a;">The 1980s</h3>
<p><img loading="lazy" decoding="async" class="" src="https://alpinesecurity.com/wp-content/uploads/2020/02/old+computers.jpg" alt=" Vintage computers. " width="1009" height="727" /></p>
<p style="white-space: pre-wrap;">In 1984, the US Navy got in on the ethical hacking action when a team of Navy Seals worked to evaluate how easily terrorists could access different naval bases. Around the same time, the US government was starting to come down on illegal hackers. One result of this process was <a href="https://en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act">the Computer Fraud and Abuse Act</a>, which specified that particular ethical hacking techniques were only allowed under a contract between hacker and client organization.</p>
<h3 style="white-space: pre-wrap; font-weight: 600; color: #02548a;">The 1990s</h3>
<p style="white-space: pre-wrap;">As hacking became more advanced, so did penetration testing.  In 1995, Dan Farmer of Sun Microsystems and Wietse Venema of the Eindhoven University of Technology released a paper entitled “<a href="https://cyberwar.nl/d/1993-FarmerVenema-comp.security.unix-Improving-the-Security-of-Your-Site-by-Breaking-Into-It.pdf">Improving the Security of Your Site by Breaking Into It.</a>”</p>
<p style="white-space: pre-wrap;">Farmer and Venema described the emergence of the “uebercracker,” a hacker who had evolved beyond the ordinary and had learned to develop his own hacking programs. This person can discover bugs in the most advanced security systems and can get in and out of a system without leaving a trace. They showed rather than told the importance of a system owner&#8217;s looking at his or her own system in the way a hacker might, thus laying the groundwork for contemporary penetration testing.<br />
In the same year, John Patrick of IBM termed this process “ethical hacking.”</p>
<h3 style="white-space: pre-wrap; font-weight: 600; color: #02548a;">The 2000s</h3>
<p style="white-space: pre-wrap;">After the turn of the new millennium, penetration testing finally began to solidify as a discipline. In 2003, the <a href="https://www.owasp.org/index.php/Main_Page">Open Web Application Security Project (OWASP)</a> published its Testing Guide, which delineated the industry&#8217;s first set of best practices. Six years later, the <a href="http://www.pentest-standard.org/index.php/Main_Page">Penetration Testing Execution Standard (PTES)</a> offered providers of penetration testing services with a set of common practices.</p>
<h3 style="white-space: pre-wrap; font-weight: 600; color: #02548a;">&#8230;And Today</h3>
<p style="white-space: pre-wrap;">In 2013, calculations revealed that spending on enterprise security had exceeded $6 billion. Skilled ethical hackers now have a marketplace that desperately needs what they are able to do, so long as employers continue to realize how important it is to stay secure against the smartest attackers.</p>
<h2 style="white-space: pre-wrap; font-weight: 600; color: #02548a;">Why Penetration Testing Matters</h2>
<p style="white-space: pre-wrap;">Systems and software are always changing, and new security protocols are evolving all the time. But a security system&#8217;s advanced nature doesn&#8217;t make it invulnerable; it just means that the system can now guard against attack types that have already happened.</p>
<p style="white-space: pre-wrap;">Hackers are just as innovative and just as committed to effectiveness as the people who develop security systems. Companies need penetration testing to approach systems with this same determination and skill but without the intent to do actual harm to the organization.</p>
<h3 style="white-space: pre-wrap; font-weight: 600; color: #02548a;">Know Thine Enemy</h3>
<p style="white-space: pre-wrap;">Now that “data breach” has become a household term, threat detection, response, and prevention systems have become more in-depth across multiple industries. What is still missing from many such systems, however, is specific knowledge of what these threats look like.  We don&#8217;t know how to make our systems stronger if we don&#8217;t know where the weaknesses are.</p>
<p style="white-space: pre-wrap;">This is where penetration testing comes in. By running simulated attacks and figuring out how a smart hacker could bypass existing security protocol, an organization can identify what parts of the system need strengthening, as well as how to respond effectively if a hacker does break through those barriers.</p>
<h3 style="white-space: pre-wrap; font-weight: 600; color: #02548a;">Identify the Real Threats</h3>
<p style="white-space: pre-wrap;">You may have heard about a certain attack vector or sequence of attack vectors. It might be possible to take that rumor as gospel and develop protections against those vectors, but who&#8217;s to say that the actual threat might come from a different vector? Or even a different sequence of the same vectors?</p>
<p style="white-space: pre-wrap;">An ethical hacker can check on the sequence that a company feels is most threatening and either</p>
<ol data-rte-list="default">
<li>
<p style="white-space: pre-wrap;">pinpoint where the threat is, or</p>
</li>
<li>
<p style="white-space: pre-wrap;">determine that you should be more worried about a different vector entirely.</p>
</li>
</ol>
<p style="white-space: pre-wrap;">The same ethical hacker can also take a look at vulnerabilities that the company thought were not as threatening and figure out if a traditional hacker could combine them in a way that accesses the system.</p>
<h3 style="white-space: pre-wrap; font-weight: 600; color: #02548a;">Identify Cause and Effect</h3>
<p style="white-space: pre-wrap;">Penetration testing can help a company not only to identify how a hacker might access the system but also to see what the impacts could be on business operations. This information is invaluable to the development of a company&#8217;s threat response and prevention strategy.</p>
<h2 style="white-space: pre-wrap; font-weight: 600; color: #02548a;">Penetration Testing Risks and Benefits</h2>
<p style="white-space: pre-wrap;">No process is perfect, and penetration testing does have its risks.  Most of the risks, however, come from poorly conducted ethical hacking.</p>
<h2 style="white-space: pre-wrap; font-weight: 600; color: #02548a;">Readiness for Tests, Not Attacks</h2>
<p style="white-space: pre-wrap;">It&#8217;s great for staff members to feel safe, but the company doesn&#8217;t want them to get complacent. If their supervisor announces that they are doing penetration testing, the staff might fall into the trap of preparing for the test and then feeling overly secure when they pass.</p>
<p style="white-space: pre-wrap;">The company could get around this by offering unannounced pen-testing. These kinds of tests are only on the radar of upper management, so they get a better sense of how prepared a security staff actually is.</p>
<h3 style="white-space: pre-wrap; font-weight: 600; color: #02548a;">Potential Damage to a System</h3>
<p style="white-space: pre-wrap;">If a penetration testing professional doesn&#8217;t have the proper training and experience, his or her attempts to access a system could cause the same damage as an actual attack. This includes:</p>
<ul data-rte-list="default">
<li>
<p style="white-space: pre-wrap;">sensitive data becoming compromised</p>
</li>
<li>
<p style="white-space: pre-wrap;">servers crashing</p>
</li>
<li>
<p style="white-space: pre-wrap;">systems becoming corrupted</p>
</li>
</ul>
<p style="white-space: pre-wrap;">These risks are also present if an ethical hacker isn&#8217;t actually ethical at all. These people do exist, so companies have to be careful and hire only credentialed professional penetration testers.</p>
<h2 style="white-space: pre-wrap; font-weight: 600; color: #02548a;">Start a Career in Penetration Testing</h2>
<p style="white-space: pre-wrap;">If you&#8217;d like to be one of the people that companies trust to perform penetration testing services, your first step is to pursue penetration testing training and secure a well-respected industry certification.</p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Penetration Testing History' data-link='https://christianespinosa.com/blog/penetration-testing-history/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Penetration Testing History' data-link='https://christianespinosa.com/blog/penetration-testing-history/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/penetration-testing-history/">Penetration Testing History</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/penetration-testing-history/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Leetspeak: The History of Hacking Subculture&#8217;s Native Tongue</title>
		<link>https://christianespinosa.com/blog/leetspeak-the-history-of-hacking-subcultures-native-tongue/</link>
					<comments>https://christianespinosa.com/blog/leetspeak-the-history-of-hacking-subcultures-native-tongue/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Sat, 04 Sep 2021 05:44:27 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[1337.me]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[language]]></category>
		<category><![CDATA[leet generator]]></category>
		<category><![CDATA[leetspeak]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2618</guid>

					<description><![CDATA[<p>You&#8217;ve probably seen leetspeak, also known as 1337 or “l33t,” somewhere on the Internet or in a movie about computer hacking. It&#8217;s essentially regular English, but with more hacker slang and with certain letters changed to numbers. Leetspeak – An Origin Story Developed in the early 1980s, leetspeak actually predates the World Wide Web by nearly a [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/leetspeak-the-history-of-hacking-subcultures-native-tongue/">Leetspeak: The History of Hacking Subculture&#8217;s Native Tongue</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Leetspeak: The History of Hacking Subculture&#039;s Native Tongue' data-link='https://christianespinosa.com/blog/leetspeak-the-history-of-hacking-subcultures-native-tongue/' data-app-id-name='category_above_content'></div><p style="white-space: pre-wrap;"><img loading="lazy" decoding="async" class="aligncenter wp-image-2619 size-full" src="https://christianespinosa.com/wp-content/uploads/2021/09/leetspeak.jpg" alt="leetspeak" width="1274" height="543" srcset="https://christianespinosa.com/wp-content/uploads/2021/09/leetspeak.jpg 1274w, https://christianespinosa.com/wp-content/uploads/2021/09/leetspeak-300x128.jpg 300w, https://christianespinosa.com/wp-content/uploads/2021/09/leetspeak-1024x436.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2021/09/leetspeak-768x327.jpg 768w, https://christianespinosa.com/wp-content/uploads/2021/09/leetspeak-640x273.jpg 640w" sizes="(max-width: 1274px) 100vw, 1274px" />You&#8217;ve probably seen leetspeak, also known as 1337 or “l33t,” somewhere on the Internet or in a movie about computer hacking. It&#8217;s essentially regular English, but with more hacker slang and with certain letters changed to numbers.</p>
<h2 style="white-space: pre-wrap; font-weight: 600; color: #02548a;">Leetspeak – An Origin Story</h2>
<p style="white-space: pre-wrap;">Developed in the early 1980s, <a href="https://knowyourmeme.com/memes/1337-speak">leetspeak actually predates the World Wide Web</a> by nearly a decade. It started on Bulletin Board Systems when the Internet was first developing and only people with elite status could access certain content.  That content often included information that those elites didn&#8217;t want anyone outside their circles to find.</p>
<h3 style="white-space: pre-wrap; font-weight: 600; color: #02548a;">Outsmarting the System</h3>
<p style="white-space: pre-wrap;">In those days, search functions scanned for specific keywords to identify their targets. Early hacker communities figured out that changing a few of the letters within a word could throw the search engines off the proverbial scent.  By using “h3ll0” for “hello,” for example, they could protect the privacy of their content while keeping it readable among themselves.</p>
<h3 style="white-space: pre-wrap; font-weight: 600; color: #02548a;">The Mark of an &#8220;3l33t&#8221;</h3>
<p style="white-space: pre-wrap;">As leetspeak became more well-known, gamers began to use it to present themselves as high status. The phrase “1 4m 3l33t!” (or, “I am elite!”) became a popular way for both gamers and hackers to show that they had reached the top of the pack.</p>
<h3 style="white-space: pre-wrap; font-weight: 600; color: #02548a;">Levels of L33t</h3>
<p style="white-space: pre-wrap;">Th1s s3nt3nc3 1s wr1tt3n 1n b4sic l33t. (&#8220;This sentence is written in basic leet.&#8221;)</p>
<p style="white-space: pre-wrap;">It&#8217;s pretty understandable, even to someone who isn&#8217;t well versed in the world of computer hacking. All you do is <a href="http://www.gamehouse.com/blog/leet-speak-cheat-sheet/ ">get rid of vowels and substitute numbers</a> that look similar.</p>
<h3 style="white-space: pre-wrap; font-weight: 600; color: #02548a;">The Next Step</h3>
<p style="white-space: pre-wrap;">Intermediate-level leet starts to get the consonants involved, and it looks “50meth1n9 l1k3 th15.” It&#8217;s more challenging to read than basic leet but still decipherable, particularly to eyes and brains that are already familiar with the basic form. A 5 looks enough like an S, for example, that a reader can go from “is” to “1s” to “15” without excessive confusion.</p>
<h3 style="white-space: pre-wrap; font-weight: 600; color: #02548a;">Advanced Leet</h3>
<p style="white-space: pre-wrap;">Advanced leet brings in yet more replacements, including more replacements per letter.</p>
<p style="white-space: pre-wrap;">If you read a message in basic or intermediate leet, the replacement for the letter E will almost always be the number 3. Once you get into advanced leet, however, you have a lot more options. You can still indicate E using 3, but you can also use &amp;, €, ë, and even |=-. Just the word leet has dozens of possible translations, from the classic l33t to |_&amp;€”|”.</p>
<h3 style="white-space: pre-wrap; font-weight: 600; color: #02548a;">Your Basic L33t Vocabulary</h3>
<p style="white-space: pre-wrap;">As with any dialect, there are words that anyone who is “in the know” has to have in their vocabulary. Many of them have to do with status. (Specifically, the speaker being of a higher status than others.)</p>
<h3 style="white-space: pre-wrap; font-weight: 600; color: #02548a;">“Pwn”</h3>
<p style="white-space: pre-wrap;">“Pwn” is one of the most popular leetspeak words in hacker culture. It&#8217;s <a href="https://www.lifewire.com/what-is-pwned-2483497">an intentional typo of “own,”</a> a word that the early hackers of the 80&#8217;s used to mean taking over control of another computer.</p>
<p style="white-space: pre-wrap;">Urban legends offer a number of explanations for how the shift from “own” to “pwn” happened. Some say that it has always been an intentional misspelling, while others say that it was an honest mistake that took off in common usage.</p>
<p style="white-space: pre-wrap;">In either case, it&#8217;s become a popular way to express your victory or defeat. While you can definitely “pwn” someone, it&#8217;s also common to admit that you “g0t pwned.” It&#8217;s usually pronounced “got poned.”</p>
<h3 style="white-space: pre-wrap; font-weight: 600; color: #02548a;">“N00b”</h3>
<p style="white-space: pre-wrap;">N00b, or “noob” in non-leetspeak, is a shortened form of &#8220;newbie.&#8221; Programmers and hackers started calling people “newbies” around the same time that they started “owning” each others&#8217; systems. And like “own,” the word newbie evolved into noob and n00b.</p>
<p style="white-space: pre-wrap;">The new spellings are specifically derogatory. Being a “newb” simply means that you&#8217;re new at something, which is perfectly fine in and of itself. If someone&#8217;s <a href="https://www.digitaltrends.com/gaming/noob-newbie-word-origins/">calling you a “n00b” or “noob,”</a> however, that usually means that they think you&#8217;re not only new or unskilled but also disrespectfully content to be ignorant.</p>
<h3 style="white-space: pre-wrap; font-weight: 600; color: #02548a;">Haxor</h3>
<p style="white-space: pre-wrap;">Like the first leetspeak words, &#8220;haxor&#8221; expresses the speaker&#8217;s claim to the hacking community. It literally means “hacker” or even “to hack.”</p>
<p style="white-space: pre-wrap;">The term &#8220;haxor&#8221; usually refers to <a href="https://www.definitions.net/definition/haxor ">a particularly advanced hacker</a> (or haxor) and may even be used in reference to leetspeak itself. For example, “that haxor always types haxor.”</p>
<h2 style="white-space: pre-wrap; font-weight: 600; color: #02548a;">Leetspeak Out in the World</h2>
<p style="white-space: pre-wrap;">Even now, leetspeak continues to evolve and make its way into new corners of our perpetually connected society. Google even uses it to communicate with members of the general public, but with an insider nod to hacker culture.</p>
<h3 style="white-space: pre-wrap; font-weight: 600; color: #02548a;">Google&#8217;s Bug Bounty</h3>
<p style="white-space: pre-wrap;">The Google Vulnerability Reward Program (VRP), known colloquially as its “bug bounty,” offers rewards to users who can identify and draw Google&#8217;s attention to security vulnerabilities that can compromise user data.</p>
<p style="white-space: pre-wrap;">If a user finds such a vulnerability in a qualifying Google site, the specifics of which are <a href="https://www.google.com/about/appsecurity/reward-program/">detailed on the VRP website</a>, Google will offer a financial reward. Reward amounts range from $100 to $31,337. Remove the comma and the dollar sign from that maximum amount and you have “31337.”</p>
<p style="white-space: pre-wrap;">Or, in non-leetspeak, &#8220;eleet.&#8221;</p>
<h3 style="white-space: pre-wrap; font-weight: 600; color: #02548a;">Hacker Movies</h3>
<p style="white-space: pre-wrap;">Hacker culture even has <a href="https://www.techworm.net/2016/03/10-best-hacking-movies-watch-right-now.html">its own filmography</a>. A quick Google search for “hacker movies” will give you lists of what dozens of people believe to be the best. Popular titles include:</p>
<ul>
<li style="white-space: pre-wrap;">Untraceable (2008)</li>
<li style="white-space: pre-wrap;">The Italian Job (2003)</li>
<li style="white-space: pre-wrap;">The Matrix (1999)</li>
<li style="white-space: pre-wrap;">Hackers (1995)</li>
</ul>
<p><iframe src="https://www.youtube.com/embed/cSp1dM2Vj48" width="560" height="315" frameborder="0" allowfullscreen="allowfullscreen" data-mce-fragment="1"></iframe></p>
<p style="white-space: pre-wrap;">One recent example is the movie adaptation of the novel <em>Ready Player One</em>, the story of one gamer&#8217;s search for the industry&#8217;s biggest “Easter egg.” The book and the movie both include characters with leetspeak names.</p>
<p style="white-space: pre-wrap;">These characters are employees of the big bad corporation, IOI. They are known as the “suxorzs,” or the “sux0rz.” The word is a leetspeak translation of “sixers,” a nickname given because of their avatar names are also their <a href="http://readyplayerone.wikia.com/wiki/Sixers">six-digit employee numbers</a>. It is also the <a href="https://www.urbandictionary.com/define.php?term=suxors">leetspeak term for “this sucks.”</a></p>
<h2 style="white-space: pre-wrap; font-weight: 600; color: #02548a;">Leetspeak and You</h2>
<p style="white-space: pre-wrap;">Some people take to leetspeak like a natural second language. These are the people who might go on to pursue a career in hacking – and yes, it is possible. Even legal.</p>
<p style="white-space: pre-wrap;">The first step is training in cybersecurity and penetration testing. Through professionally designed courses, like those offered by Cerberus Sentinel, you can learn the techniques that hackers – sorry, haxors – use to access today&#8217;s systems.</p>
<p style="white-space: pre-wrap;">Go ahead &#8211; build a career that will let you pwn the h4x0rs. Also, develop some people skills while you&#8217;re at it &#8211; read my book <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/">&#8220;The Smartest Person in the Room&#8221;</a> to learn how.</p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Leetspeak: The History of Hacking Subculture&#039;s Native Tongue' data-link='https://christianespinosa.com/blog/leetspeak-the-history-of-hacking-subcultures-native-tongue/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Leetspeak: The History of Hacking Subculture&#039;s Native Tongue' data-link='https://christianespinosa.com/blog/leetspeak-the-history-of-hacking-subcultures-native-tongue/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/leetspeak-the-history-of-hacking-subcultures-native-tongue/">Leetspeak: The History of Hacking Subculture&#8217;s Native Tongue</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/leetspeak-the-history-of-hacking-subcultures-native-tongue/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hacking Medical Devices for Profit and Terror</title>
		<link>https://christianespinosa.com/blog/hacking-medical-devices-for-profit-and-terror/</link>
					<comments>https://christianespinosa.com/blog/hacking-medical-devices-for-profit-and-terror/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Sat, 04 Sep 2021 05:04:25 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[dick cheney]]></category>
		<category><![CDATA[EMR]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[hacking medical devices]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[medical device security]]></category>
		<category><![CDATA[PHI]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2610</guid>

					<description><![CDATA[<p>Introduction This post focuses on four medical device cybersecurity attack objectives: Stealing Protected Health Information (PHI) (Motive: Financial Gain) Ransomware (Motive: Financial Gain) Harming or killing a patient (Motive: Terrorism or Assassination) Using the medical device as a beachhead for enemy advancement (Motive: Foothold to Expand Operations) In this post, I will cover a little [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/hacking-medical-devices-for-profit-and-terror/">Hacking Medical Devices for Profit and Terror</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Hacking Medical Devices for Profit and Terror' data-link='https://christianespinosa.com/blog/hacking-medical-devices-for-profit-and-terror/' data-app-id-name='category_above_content'></div><div id="block-cb1ec3ebf781a6d2aafb" class="sqs-block html-block sqs-block-html" data-block-type="2">
<div class="sqs-block-content">
<h2 style="white-space: pre-wrap; font-weight: 600; color: #02548a;"><img loading="lazy" decoding="async" class=" wp-image-2611 alignright" src="https://christianespinosa.com/wp-content/uploads/2021/09/jair-lazaro-0lrJo37r6Nk-unsplash-300x169.jpg" alt="hacking medical devices" width="372" height="209" srcset="https://christianespinosa.com/wp-content/uploads/2021/09/jair-lazaro-0lrJo37r6Nk-unsplash-300x169.jpg 300w, https://christianespinosa.com/wp-content/uploads/2021/09/jair-lazaro-0lrJo37r6Nk-unsplash-1024x576.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2021/09/jair-lazaro-0lrJo37r6Nk-unsplash-768x432.jpg 768w, https://christianespinosa.com/wp-content/uploads/2021/09/jair-lazaro-0lrJo37r6Nk-unsplash-1536x864.jpg 1536w, https://christianespinosa.com/wp-content/uploads/2021/09/jair-lazaro-0lrJo37r6Nk-unsplash-2048x1152.jpg 2048w, https://christianespinosa.com/wp-content/uploads/2021/09/jair-lazaro-0lrJo37r6Nk-unsplash-800x450.jpg 800w, https://christianespinosa.com/wp-content/uploads/2021/09/jair-lazaro-0lrJo37r6Nk-unsplash-640x360.jpg 640w" sizes="(max-width: 372px) 100vw, 372px" />Introduction</h2>
<p class="">This post focuses on four medical device cybersecurity attack objectives:</p>
<ol data-rte-list="default">
<li>
<p class="">Stealing Protected Health Information (PHI) (Motive: Financial Gain)</p>
</li>
<li>
<p class="">Ransomware (Motive: Financial Gain)</p>
</li>
<li>
<p class="">Harming or killing a patient (Motive: Terrorism or Assassination)</p>
</li>
<li>
<p class="">Using the medical device as a beachhead for enemy advancement (Motive: Foothold to Expand Operations)</p>
</li>
</ol>
<p class="">In this post, I will cover a little background on why medical device security is something to pay attention to, elaborate on the four attack objectives, and provide some solutions.</p>
<h2 style="white-space: pre-wrap; font-weight: 600; color: #02548a;">Background</h2>
<p class="">Unsecured medical devices and the Internet of Medical Things (IOMT) are major cybersecurity concerns. These devices are typically deployed in hostile hospital and clinic environments. Yes, I said hostile. Why hostile? Most hospital environments, despite “HIPAA Compliance” remain vulnerable. I know this based on many penetration tests of both hospital and clinic environments. Compliance has little to do with security. Yet, compliance is often both the minimum and maximum effort organizations put towards cybersecurity.</p>
<p class="">Attacks against medical devices are either unintentional or intentional. Unintentional, often referred to as non-directed attacks, are broad, non-targeted attacks by malware that is spreading in the “wild” by broad phishing schemes or simply lateral movement. Lateral movement is when an infected system spreads the malware to other vulnerable systems on the same network or environment. Intentional attacks also referred to as directed attacks, are targeted attacks by an entity with a specific objective.</p>
<p class="">In cybersecurity, there are generally three areas we care about &#8211; confidentiality, integrity, and availability. These are often referred to as the CIA triad. The idea is if you increase one, the others may suffer, so there has a be a balance. For instance, if I focus on confidentiality and make everything super secure (encrypted, require multiple factors to log on, etc.), then availability may suffer. The balance should be based on risk.</p>
</div>
</div>
<div id="block-yui_3_17_2_1_1580995437556_36554" class="sqs-block html-block sqs-block-html" data-block-type="2">
<div class="sqs-block-content">
<h2 style="white-space: pre-wrap; font-weight: 600; color: #02548a;">Medical Device Hacking Objectives</h2>
<h3 style="white-space: pre-wrap; font-weight: 600; color: #02548a;">1 &#8211; Stealing Protected Health Information (PHI) (Motive: Financial Gain)</h3>
<p class="">Many medical devices contain PHI that can be stolen directly from the device, or a compromised medical device can be leveraged to obtain PHI. For instance, a medical device may be connected to an Electronic Medical Records (EMR) system. The trusted connection between the medical device and the EMR could be leveraged by an attacker to siphon PHI from the EMR.</p>
<p class="">PHI is often stolen using targeted attacks, but can easily be stolen by a non-targeted attack, where the malicious software (malware) happens to land on a vulnerable system containing PHI. A targeted PHI attack could be an attack to get “dirt” on a celebrity or politician to blackmail them or try to smear their reputation. An example of this would be to steal records for sexually transmitted diseases (STDs) at places celebrities may have received testing.</p>
<p class=""><strong>Type of Attack: Typically non-directed, although may be targeted.</strong></p>
<p class=""><strong>CIA Triad Affect: Confidentiality.</strong></p>
</div>
</div>
<div id="block-yui_3_17_2_1_1580995851126_41393" class="sqs-block html-block sqs-block-html" data-block-type="2">
<div class="sqs-block-content">
<h3 style="white-space: pre-wrap; font-weight: 600; color: #02548a;">2 &#8211; Ransomware (Motive: Financial Gain)</h3>
<p class="">Ransomware is quite common in hospitals and clinics and has actually been linked to an increase in fatal heart attacks. According to a <a href="https://krebsonsecurity.com/2019/11/study-ransomware-data-breaches-at-hospitals-tied-to-uptick-in-fatal-heart-attacks/" target="_blank" rel="noopener noreferrer">post on the krebsonsecurity.com:</a></p>
<p class="">“The researchers found that for care centers that experienced a breach, it took an additional 2.7 minutes for suspected heart attack patients to receive an electrocardiogram.”</p>
<p class="">Ransomware is typically a non-targeted attack, seeking as many vulnerable victims as possible. Many medical devices run older operating systems, such as Windows XP embedded, Windows 7 embedded, or an older version of Linux. These older systems make them vulnerable to these types of attacks.</p>
<p class=""><strong>Type of Attack: Typically non-directed, although may be targeted.</strong></p>
<p class=""><strong>CIA Triad Affect: Confidentiality and Availability.</strong></p>
<h3 style="white-space: pre-wrap; font-weight: 600; color: #02548a;">3 &#8211; Harming or killing a patient (Motive: Terrorism or Assassination)</h3>
<p class="">As mentioned previously, ransomware can impose delays in treatment that can result in deaths, even though this is not the motive.</p>
<p class="">Harming or killing patients motivated by terrorism or a targeted assassination typically involves altering the logic of a medical device or controlling the device to create the desired effect. An example of terrorism is <a href="https://www.theregister.co.uk/2018/08/14/patient_monitor_hack/" target="_blank" rel="noopener noreferrer">hacking into hospital patient monitoring systems</a> to alter all the patient readings &#8211; to “flat-line” them all to create a panic and force the use of an alternative system or method.</p>
</div>
</div>
<div id="block-yui_3_17_2_1_1580947604346_10877" class="sqs-block video-block sqs-block-video sqs-col-5 span-5 float float-right" data-block-json="{&quot;blockAnimation&quot;:&quot;none&quot;,&quot;layout&quot;:&quot;caption-hidden&quot;,&quot;overlay&quot;:false,&quot;description&quot;:{&quot;html&quot;:&quot;The former vice president had heart device partially disabled to prevent potential terrorist attack.&quot;},&quot;hSize&quot;:5,&quot;floatDir&quot;:&quot;right&quot;,&quot;html&quot;:&quot;&lt;iframe src=\&quot;//www.youtube.com/embed/8Whkn9IrJds?wmode=opaque&amp;amp;enablejsapi=1\&quot; height=\&quot;480\&quot; width=\&quot;854\&quot; scrolling=\&quot;no\&quot; frameborder=\&quot;0\&quot; allowfullscreen=\&quot;\&quot;&gt;\n&lt;/iframe&gt;&quot;,&quot;url&quot;:&quot;https://youtu.be/8Whkn9IrJds&quot;,&quot;width&quot;:854,&quot;height&quot;:480,&quot;providerName&quot;:&quot;YouTube&quot;,&quot;thumbnailUrl&quot;:&quot;https://i.ytimg.com/vi/8Whkn9IrJds/hqdefault.jpg&quot;,&quot;resolvedBy&quot;:&quot;youtube&quot;}" data-block-type="32">
<div id="yui_3_17_2_1_1582159308389_426" class="sqs-block-content">
<div class="intrinsic">
<div class="embed-block-wrapper">
<div id="yui_3_17_2_1_1582159308389_433" class="sqs-video-wrapper video-none" data-html="&lt;iframe src=&quot;//www.youtube.com/embed/8Whkn9IrJds?wmode=opaque&amp;enablejsapi=1&quot; height=&quot;480&quot; width=&quot;854&quot; scrolling=&quot;no&quot; frameborder=&quot;0&quot; allowfullscreen=&quot;&quot;&gt;&lt;br/&gt;&lt;/iframe&gt;" data-provider-name="YouTube">
<div class="intrinsic">
<div class="intrinsic-inner"><iframe id="yui_3_17_2_1_1582159308389_437" src="https://www.youtube.com/embed/8Whkn9IrJds?wmode=opaque&amp;enablejsapi=1" width="854" height="480" frameborder="0" scrolling="no" allowfullscreen="allowfullscreen" data-mce-fragment="1">&lt;br/&gt;</iframe></div>
</div>
</div>
</div>
</div>
</div>
</div>
<div id="block-yui_3_17_2_1_1580995851126_56121" class="sqs-block html-block sqs-block-html" data-block-type="2">
<div class="sqs-block-content">
<p class="" style="font-size: 16px;">An example of an assassination is what Dick Cheney was afraid of &#8211; someone hacking into his pacemaker to cause it to stop working or shock his heart to death.</p>
<p class=""><strong>Type of Attack: If Terrorism, could be non-directed. Assassination will be targeted.</strong></p>
<p class=""><strong>CIA Triad Affect: Integrity and Availability.</strong></p>
<h3 style="white-space: pre-wrap; font-weight: 600; color: #02548a;">4 &#8211; Using the medical device as a beachhead (Motive: Foothold to Expand Operations)</h3>
<p class="">Many vendors only care about the cybersecurity of their device, focusing only on vulnerabilities that can directly affect the CIA of their medical device. Often a vulnerability in one device that may not directly affect that device can be leveraged as a beachhead to expand hacking operations by putting a sleeper cell in friendly territory. When needed, that sleeper cell can be called upon by the hackers to wreak havoc.</p>
<p class="">An example of this is an unnecessary service, such as FTP, that is running on a medical device. The service has a vulnerability that doesn’t directly affect the operation of the medical device, but could be leveraged for future attacks by providing a point inside a friendly network that an attacker can use to amass attacks from inside a perimeter.</p>
<p class=""><strong>Type of Attack: Typically non-directed, although may be targeted.</strong></p>
<p class=""><strong>CIA Triad Affect: None.</strong></p>
<h2 style="white-space: pre-wrap; font-weight: 600; color: #02548a;">Solutions</h2>
<p class="">It’s best to move from uniformed optimism to informed realism. Medical device manufacturers are excellent at making their devices reduce diagnosis time, helping a physician, or solving a medical issue. Cybersecurity is usually not an area of expertise or a concern for a medical device manufacturer. It’s understandable to see the world through the uninformed optimism lens when there is limited awareness of what is possible from a cybersecurity attack and risk perspective.</p>
<p class="">The move to informed realism typically involves hiring the right cybersecurity experts that see the world differently, that look at the medical device through the lens of a hacker. They view the medical device not as a medical tool or aid, but as a system to exploit with the same objectives we discussed in this article. Hiring trusted, ethical hackers to proactively assess and test a medical device before it is deployed to a hostile healthcare environment is prudent and now mandated by the FDA.</p>
<p class="">Medical devices are behind the curve with cybersecurity but are slowly catching up. Thanks to the <a href="https://www.fda.gov/medical-devices/digital-health/cybersecurity" target="_blank" rel="noopener noreferrer">FDA</a>, organizations like <a href="https://www.secure-medicine.org/" target="_blank" rel="noopener noreferrer">Archimedes</a> and many security researchers, the real consequences to patient safety caused by vulnerable medical devices are starting to reach the right ears and be taken seriously.</p>
</div>
<p>Need help securing your medical device? <a href="https://christianespinosa.com/cerberus-sentinel/" target="_blank" rel="noopener">Connect with me.</a></p>
</div>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Hacking Medical Devices for Profit and Terror' data-link='https://christianespinosa.com/blog/hacking-medical-devices-for-profit-and-terror/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Hacking Medical Devices for Profit and Terror' data-link='https://christianespinosa.com/blog/hacking-medical-devices-for-profit-and-terror/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/hacking-medical-devices-for-profit-and-terror/">Hacking Medical Devices for Profit and Terror</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/hacking-medical-devices-for-profit-and-terror/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Black Box Penetration Testing Explained</title>
		<link>https://christianespinosa.com/blog/black-box-penetration-testing-explained/</link>
					<comments>https://christianespinosa.com/blog/black-box-penetration-testing-explained/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Sun, 29 Aug 2021 17:29:41 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[black box penetration test]]></category>
		<category><![CDATA[christian espinosa]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[pen testing]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[video]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2582</guid>

					<description><![CDATA[<p>This blog post is a transcript of Christian Espinosa&#8217;s explanation of Black Box Penetration Testing, which covers the following: Differences between Black, Gray, and White Box Penetration Tests Internal vs. External Black Box Penetration Tests Blac Box Threats Emulated External Hacker with little or no insider knowledge Rogue Device Internal Intruder Check out my latest [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/black-box-penetration-testing-explained/">Black Box Penetration Testing Explained</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Black Box Penetration Testing Explained' data-link='https://christianespinosa.com/blog/black-box-penetration-testing-explained/' data-app-id-name='category_above_content'></div><p><img loading="lazy" decoding="async" class="wp-image-2583 alignright" src="https://christianespinosa.com/wp-content/uploads/2021/08/maxresdefault-1-300x169.jpg" alt="Black Box Penetration Testing" width="380" height="214" srcset="https://christianespinosa.com/wp-content/uploads/2021/08/maxresdefault-1-300x169.jpg 300w, https://christianespinosa.com/wp-content/uploads/2021/08/maxresdefault-1-1024x576.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2021/08/maxresdefault-1-768x432.jpg 768w, https://christianespinosa.com/wp-content/uploads/2021/08/maxresdefault-1-800x450.jpg 800w, https://christianespinosa.com/wp-content/uploads/2021/08/maxresdefault-1.jpg 1280w" sizes="(max-width: 380px) 100vw, 380px" />This blog post is a transcript of Christian Espinosa&#8217;s explanation of Black Box Penetration Testing, which covers the following:</p>
<ul>
<li>Differences between Black, <a href="https://christianespinosa.com/blog/gray-box-penetration-testing-explained/" target="_blank" rel="noopener">Gray</a>, and <a href="https://christianespinosa.com/blog/white-box-penetration-testing-explained/" target="_blank" rel="noopener">White Box</a> Penetration Tests</li>
<li>Internal vs. External Black Box Penetration Tests</li>
<li>Blac Box Threats Emulated
<ul>
<li>External Hacker with little or no insider knowledge</li>
<li>Rogue Device</li>
<li>Internal Intruder</li>
</ul>
</li>
</ul>
<p>Check out my latest book: <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener">https://christianespinosa.com/books/the-smartest-person-in-the-room/</a></p>
<p>Need a black box penetration test, check out my company <a href="https://bluegoatcyber.com/services/penetration-testing/black-box-penetration-testing/" target="_blank" rel="noopener">Blue Goat Cyber&#8217;s Black Box Penetration Test Services</a>.</p>
<p><iframe title="Black Box Penetration Testing Explained" width="500" height="281" src="https://www.youtube.com/embed/Xc4IcyVErgs?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2>Complete Black Box Penetration Testing Video Transcript</h2>
<p>Hi, this is Christian Espinosa with Alpine Security. In this video, we&#8217;ll cover black box penetration tests. In a previous video, we covered<a href="https://christianespinosa.com/blog/gray-box-penetration-testing-explained/" target="_blank" rel="noopener"> gray box penetration tests</a>. I&#8217;ll put the link to that video beneath this one. With a black box penetration test, we have the least amount of knowledge from the scale of black, gray and white. A black box penetration test, you typically know very little about the target, maybe the IP address or the URL. With a gray box, you have a little bit more knowledge, typically user-level knowledge. In a <a href="https://christianespinosa.com/blog/white-box-penetration-testing-explained/" target="_blank" rel="noopener">white box</a>, you typically have administrator-level knowledge or access to the schematics, the source code, the design documents, et cetera. Also with black box, this is called unauthenticated often because we do not have any level of access from a user perspective, like gray box or an administrator route level perspective like white box.</p>
<p>A black box penetration test can be used both internally and externally, and we&#8217;ll go over more detail of that in a second on the next slide. The threats we&#8217;re trying to emulate with a black box penetration test are an external attacker with very little knowledge about your environment, a rogue device, or an internal intruder. We&#8217;ll cover those in more detail here in a second. With an external black box penetration test, we&#8217;re looking at the perspective from outside your network. We&#8217;re testing your public-facing systems. If you&#8217;re in an organization where testing the systems that are exposed to the internet &#8230; so this could be a firewall, a router, a VPN concentrator, your web server. Anything you have exposed to the internet that your employees can access or your clients can access is what we&#8217;re testing from an external black box penetration testing perspective.</p>
<p>What we&#8217;re trying to emulate is an external attacker. This could be a script kiddie, somebody in China just scanning and looking to see what they can get into. It can be a botnet that&#8217;s just trying to scan for vulnerable systems, or it could be an active attacker trying to get into your environment. An example of what we might test could be your external firewall. If you&#8217;re a small organization, and all of your internal systems are Natted through a firewall for instance, you want to make sure that those firewall rules are set up properly, and you&#8217;re not allowing inbound traffic. You&#8217;re only allowing outbound traffic, and you have some rules in place. As an example, if you type in from the internal network, what is my IP, in Google, you can figure out what your public facing IP address is. This is something we would want to test because if your public facing IP address, which is often your external router or firewall, has a hole in it then the attacker may be able to exploit that hole and get access to your internal environment.</p>
<p>Here on the picture we have, what is my IP, we have 71.14.247.83. As a quick example, if I go to Zenmap, which you can see right here, which is basically Nmap, but a graphical user interface for Nmap. This is just a quick example of reconnaissance. They put it in that IP address here, which we put in, 71.14.247.83. Let&#8217;s say I do a regular scan, so I&#8217;m looking for holes on your external facing router or firewall, or you could have a next-gen firewall, you could have a UTM, et cetera. Go ahead on click on scan here. This is the first step with penetration testing. We&#8217;re trying to identify holes you may have. Right now, I&#8217;m just using Nmap with a default setting, which looks for the top 1000 ports.</p>
<p>It looks like we have four ports open, 53, 80, 1111 and 2111. If somebody performed an external black box penetration test against your firewall or external router, this is what they would see. Granted, they should scan all 65,535 ports. But this is the top 1000, and we have four ports open out of the top 1000. We can see here that there&#8217;s a web server running, DNS running, a few other things. And now the next step would be to identify a vulnerability and then exploit that vulnerability if possible. The reason this is important because if you have a publicly exposed IP address with a vulnerability, somebody could exploit that vulnerability and potentially pivot from the external facing system. From there, they could pivot to your internal environment and get access to your internal environment or get access to a sequel database or something else. You want to make sure you test your environment from an external perspective.</p>
<p>With an internal black box penetration test, we&#8217;re looking at the environment from inside your firewall. Really, we&#8217;re trying to emulate two threats, two main threats here. One of them is a rogue device, and one of them is an internal intruder. Basically, and these could kind of bleed together as the same thing because an internal intruder could plant a rogue device. But the idea is what if somebody walks into your environment and they plant a rogue device? As we see here, this is a phone plug on the screen in the picture. Let&#8217;s say they plant this device on your network. This device is a rogue device which intercepts your traffic, and can send it out via a cellular network to somebody else. Or it could actually phone home through your network and duplicate the traffic that way. Or it could serve as a pivot point.</p>
<p>There&#8217;s a number of things it can do, but basically the idea is can you detect or are you protected against a rogue device or an internal intruder? An internal intruder example that might be, let&#8217;s say I walk into a dentist office, I&#8217;m waiting for my appointment, I&#8217;m sitting in a chair in the waiting room and I&#8217;ve got my laptop. I&#8217;m kind of bored because I&#8217;m waiting a long time, but I noticed there&#8217;s an ethernet jack exposed in the wall behind me. Let&#8217;s say I plugged my laptop into that jack, and I just started screwing around and see what I can see on the network. If I can scan the network and maybe exploit a device on the network, on that dentist&#8217;s network, that&#8217;s from an internal intruder perspective.</p>
<p>Those are why we would do a black box penetration test. In summary, what we talked about are black box penetration test. The black is the least amount of information between from gray to white. You have limited knowledge, unauthenticated. A black box penetration test can be used to emulate an external attacker as well as an internal attacker or internal rogue device. That&#8217;s basically it. The black box is really the simplest type of penetration test, and it should definitely be something you consider. If you have any questions about black box penetration tests, you can leave them beneath the video. You can also subscribe to our channel. And if you&#8217;re interested in a black box penetration test against your environment, you can contact us at <a href="https://bluegoatcyber.com/services/penetration-testing/black-box-penetration-testing/">www.bluegoatcyber.com</a>. Thanks. Have a good one.</p>
<p><script charset="utf-8" type="text/javascript" src="//js.hsforms.net/forms/embed/v2.js"></script><br />
<script>
  hbspt.forms.create({
    region: "na1",
    portalId: "7462611",
    formId: "44520873-dd69-4756-ae28-5df1df179d14"
  });
</script></p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Black Box Penetration Testing Explained' data-link='https://christianespinosa.com/blog/black-box-penetration-testing-explained/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Black Box Penetration Testing Explained' data-link='https://christianespinosa.com/blog/black-box-penetration-testing-explained/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/black-box-penetration-testing-explained/">Black Box Penetration Testing Explained</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/black-box-penetration-testing-explained/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Gray Box Penetration Testing Explained</title>
		<link>https://christianespinosa.com/blog/gray-box-penetration-testing-explained/</link>
					<comments>https://christianespinosa.com/blog/gray-box-penetration-testing-explained/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Sun, 29 Aug 2021 17:23:01 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[christian espinosa]]></category>
		<category><![CDATA[gray box penetration testing]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[pen testing]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[video]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2579</guid>

					<description><![CDATA[<p>This blog post is a transcript of Christian Espinosa&#8217;s explanation of Gray Box Penetration Testing, which covers the following: Differences between Black, Gray, and White Box Penetration Tests Gray Box = Authenticated &#8220;User&#8221; level tests Internal vs. External Gray Box Penetration Tests Often includes Black Box Testing Gray Box Threats Emulated Compromised User Account Malicious [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/gray-box-penetration-testing-explained/">Gray Box Penetration Testing Explained</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Gray Box Penetration Testing Explained' data-link='https://christianespinosa.com/blog/gray-box-penetration-testing-explained/' data-app-id-name='category_above_content'></div><p><img loading="lazy" decoding="async" class="wp-image-2580 alignright" src="https://christianespinosa.com/wp-content/uploads/2021/08/Gray-300x169.jpg" alt="Gray Box Penetration Testing" width="383" height="216" srcset="https://christianespinosa.com/wp-content/uploads/2021/08/Gray-300x169.jpg 300w, https://christianespinosa.com/wp-content/uploads/2021/08/Gray-1024x576.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2021/08/Gray-768x432.jpg 768w, https://christianespinosa.com/wp-content/uploads/2021/08/Gray-800x450.jpg 800w, https://christianespinosa.com/wp-content/uploads/2021/08/Gray.jpg 1280w" sizes="(max-width: 383px) 100vw, 383px" />This blog post is a transcript of Christian Espinosa&#8217;s explanation of Gray Box Penetration Testing, which covers the following:</p>
<ul>
<li>Differences between <a href="https://christianespinosa.com/blog/black-box-penetration-testing-explained/" target="_blank" rel="noopener">Black</a>, Gray, and <a href="https://christianespinosa.com/blog/white-box-penetration-testing-explained/" target="_blank" rel="noopener">White Box Penetration Tests</a></li>
<li>Gray Box = Authenticated &#8220;User&#8221; level tests</li>
<li>Internal vs. External Gray Box Penetration Tests</li>
<li>Often includes Black Box Testing</li>
<li>Gray Box Threats Emulated
<ul>
<li>Compromised User Account</li>
<li>Malicious Insider</li>
</ul>
</li>
</ul>
<p>Check out my latest book: <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener">https://christianespinosa.com/books/the-smartest-person-in-the-room/</a></p>
<p>In Dec 2020, Alpine Security was acquired by Cerberus Sentinel (<a href="https://www.cerberussentinel.com/">https://www.cerberussentinel.com/</a>)</p>
<p>Need a penetration test? Connect with me: <a href="https://christianespinosa.com/cerberus-sentinel/">https://christianespinosa.com/cerberus-sentinel/</a></p>
<p><iframe title="Gray Box Penetration Testing Explained" width="500" height="281" src="https://www.youtube.com/embed/v6GCYBFGTh8?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2>Complete Gray Box Penetration Testing Video Transcript</h2>
<p>What&#8217;s going on. This is Christian Espinosa with Alpine Security. In this video, we&#8217;ll go over gray box penetration tests. These are the topics we&#8217;ll discuss. The differences between black, white and gray box. A gray box falls between black and white box penetration tests. So with a black box penetration test, you typically don&#8217;t know much about the target other than maybe the IP address or the URL. That&#8217;s really about it. A black box is considered unauthenticated. You don&#8217;t know much about the target. With a gray box, you know a little bit about the target, pretty much from the perspective of the user, your user on the target. So you have user-level access to the target. With white box, you know quite a bit about the target. So you may have access to the network diagram, schematics, design documents, source code, administrator-level access, et cetera. Black have pretty much little limited access, gray in the middle, then white.</p>
<p>As the next bullet there says, gray box, you have authenticated or credentialed user level access to the system. There&#8217;s really two broad categories for gray box penetration testers, internal and external. We&#8217;ll go over those in the next couple of slides. The threats we&#8217;re trying to emulate, which with a penetration test, you&#8217;re trying to emulate some sort of threat. The threats we&#8217;re trying to emulate with gray box typically are these two threats we have listed on the slide there. A user account is compromised. So let&#8217;s say I&#8217;m Larry. I&#8217;m a user on your web application. What can the attacker do from Larry&#8217;s account&#8217;s perspective? Or I&#8217;m Nancy, a user on your active directory domain, and my account is compromised via a phishing email. So what can the attacker do from Nancy&#8217;s perspective on the internal network? What if Larry is just malicious, or what if Nancy, she&#8217;s malicious as well? Those are the threats we&#8217;re trying to emulate.</p>
<p>For external gray box penetration tests, typically, and this is where the categories I&#8217;ve mentioned, we have external and internal. Typically with external gray box penetration tests, it&#8217;s against some sort of web application. A common example as we have here on the slide is a patient portal. So a lot of hospitals and clinics have a patient portal. This is if you&#8217;re a patient, you can log on, pay your bill, look at your last visit, look at the details, maybe schedule an appointment, et cetera. With a gray box penetration test, what we&#8217;re trying to do is test the patient portal in this scenario from the perspective of, like I mentioned earlier, a compromised user or a malicious user. So if I am Larry and I&#8217;m logging on to the patient portal as Larry. From Larry&#8217;s account, what can I get access to on the patient portal? If there&#8217;s a vulnerability, can Larry, for some reason, exploit that vulnerability and somehow get access to Pam&#8217;s account, for instance? Because it would not be good if Larry can horizontally get access to Pam&#8217;s account and then read Pam&#8217;s medical history. That&#8217;s an example of a horizontal privilege escalation.</p>
<p>The other scenario is what if Larry can somehow exploit a vulnerability on the patient portal and get admin or root level permissions? Larry can see everybody&#8217;s information, including Pam&#8217;s, Sam&#8217;s, Dan&#8217;s, et cetera. So that would not be good. With a gray box penetration test, we look at the vulnerabilities of the application from the perspective of the user.</p>
<p>Let me give an example here. I&#8217;ll bring over a patient portal here. This is just an example. If I go to Google and search for patient portal, you&#8217;ll see quite a few of them pop up here. I just went to the first one right here. This is a whatever, NextGen Healthcare, it doesn&#8217;t really matter. But right now, if we&#8217;re looking at the patient portal and we&#8217;re not logged in, and let&#8217;s say we do some testing, this would be black box penetration testing. Once we&#8217;ve logged in as a user such as Larry, then we would be testing it from a gray box perspective. An example like let&#8217;s say from a black box perspective, if I type in tick or one equals one dash dash and I just put whatever here as a test for a SQL injection, that&#8217;s a black box test. With a gray box, we would test a lot of different things, but logged on as Larry, as I mentioned.</p>
<p>With Alpine security, we include the black box portion of testing with our gray box because we tested from both an unauthenticated perspective and an authenticated perspective. So that&#8217;s an example of an external gray box penetration test.</p>
<p>The other type of gray box penetration test is an internal gray box penetration test. With an internal box penetration test, what we&#8217;re looking at is what sort of damage could an internal user do with user level permissions on an internal network inside a firewall such as an active directory domain? If Sally&#8217;s computer was compromised or Sally clicked on a phishing email and her account was compromised, from the perspective of Sally&#8217;s credentials, which are user level credentials, what could the attacker do? Could the attacker somehow get access to sensitive data? Could they get access to Bruce&#8217;s account? Could they somehow find a vulnerability and exploit it on the network that gave them administrator level permission, such as domain admin, et cetera? So we&#8217;re looking at it from that perspective, and we&#8217;re also looking at from the perspective, like what if a Rodrigo, let&#8217;s say, is malicious and Rodrigo wants to steal secrets and send them to China? If Rodrigo is a malicious user, what can Rodrigo get access to using his user-level permissions? That&#8217;s the other sort of use case or threat we&#8217;re emulating.</p>
<p>Another use case is, let&#8217;s say a user&#8217;s laptop was compromised. Let&#8217;s say Jessica takes her laptop home and her boyfriend who was a spy for Russia, let&#8217;s say, gets his hands on the laptop. If the boyfriend, the spy from Russia, gets the hands on Jessica&#8217;s laptop and that boyfriend can get into Jessica&#8217;s laptop, let&#8217;s say the boyfriend&#8217;s name is Ivan. Ivan can get into Jessica&#8217;s laptop as Jessica, or Jessica leads the laptop unlocked. What sort of damage could Ivan do to that laptop or to the systems the laptop has access to? So if the laptop can VPN into the corporate network, what can Ivan get access to as Jessica? Also, Ivan can try to get access to secret stuff on the laptop. Can he escalate privileges to local admin on the laptop? Can he circumvent controls, et cetera? So again, that is an internal gray box penetration test, and we&#8217;re looking at it from the perspective of really two broad categories of threats. A malicious user or a compromised user that really didn&#8217;t mean to be malicious but their account was compromised.</p>
<p>As a summary, we talked about these main points here, the differences between black and white and gray. Gray is in the middle, black you have limited information, maybe just an IP address or URL. White, you have a lot of information. Gray, you have user level information and user level access. Which is also authenticated or credentialed. We explained a little bit the differences between internal and external. External is typically with a web application such as a patient portal. We&#8217;re testing if we can escalate privileges horizontally or vertically. With internal, we&#8217;re testing from a domain user or internal user, typically inside your firewall, and we&#8217;re seeing what we can do. Same concept from escalating privileges, horizontally or vertically, and what data an insider or internal user can get access to.</p>
<p>If you have any questions about gray box penetration testing, you can leave them beneath the video. If you are interested in us performing a gray box penetration tests against your environment, either externally or internally, you can contact us at alpinesecurity.com. You can also subscribe to our channel. If you just want to learn more about penetration testing, feel free to reach out to us or take one of our classes.</p>
<p><!--HubSpot Call-to-Action Code --><span id="hs-cta-wrapper-94f60ee8-4fbe-483b-8a0f-ad83ab12a665" class="hs-cta-wrapper"><span id="hs-cta-94f60ee8-4fbe-483b-8a0f-ad83ab12a665" class="hs-cta-node hs-cta-94f60ee8-4fbe-483b-8a0f-ad83ab12a665"><!-- [if lte IE 8]>


<div id="hs-cta-ie-element"></div>


<![endif]--><a href="https://cta-redirect.hubspot.com/cta/redirect/7462611/94f60ee8-4fbe-483b-8a0f-ad83ab12a665" target="_blank" rel="noopener"><img decoding="async" id="hs-cta-img-94f60ee8-4fbe-483b-8a0f-ad83ab12a665" class="hs-cta-img" style="border-width: 0px;" src="https://no-cache.hubspot.com/cta/default/7462611/94f60ee8-4fbe-483b-8a0f-ad83ab12a665.png" alt="Check Out The Smartest Person in The Room" /></a></span><script charset="utf-8" src="https://js.hscta.net/cta/current.js"></script><script type="text/javascript"> hbspt.cta.load(7462611, '94f60ee8-4fbe-483b-8a0f-ad83ab12a665', {"useNewLoader":"true","region":"na1"}); </script></span><!-- end HubSpot Call-to-Action Code --></p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Gray Box Penetration Testing Explained' data-link='https://christianespinosa.com/blog/gray-box-penetration-testing-explained/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Gray Box Penetration Testing Explained' data-link='https://christianespinosa.com/blog/gray-box-penetration-testing-explained/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/gray-box-penetration-testing-explained/">Gray Box Penetration Testing Explained</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/gray-box-penetration-testing-explained/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>White Box Penetration Testing Explained</title>
		<link>https://christianespinosa.com/blog/white-box-penetration-testing-explained/</link>
					<comments>https://christianespinosa.com/blog/white-box-penetration-testing-explained/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Fri, 27 Aug 2021 20:55:15 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[christian espinosa]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[pen testing]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[video]]></category>
		<category><![CDATA[white box penetration testing]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2576</guid>

					<description><![CDATA[<p>This blog post is a transcript of Christian Espinosa&#8217;s explanation of White Box Penetration Testing, which covers the following: Differences between Black, Gray, and White Box Penetration Tests White Box = Full knowledge about the target White Box is typically used during development or system integration Often includes Black and Gray Box Threats emulated: Poor [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/white-box-penetration-testing-explained/">White Box Penetration Testing Explained</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='White Box Penetration Testing Explained' data-link='https://christianespinosa.com/blog/white-box-penetration-testing-explained/' data-app-id-name='category_above_content'></div><p><img loading="lazy" decoding="async" class=" wp-image-2577 alignright" src="https://christianespinosa.com/wp-content/uploads/2021/08/white-300x169.jpg" alt="white box penetration testing - christian espinosa" width="359" height="202" srcset="https://christianespinosa.com/wp-content/uploads/2021/08/white-300x169.jpg 300w, https://christianespinosa.com/wp-content/uploads/2021/08/white-1024x576.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2021/08/white-768x432.jpg 768w, https://christianespinosa.com/wp-content/uploads/2021/08/white-800x450.jpg 800w, https://christianespinosa.com/wp-content/uploads/2021/08/white.jpg 1280w" sizes="(max-width: 359px) 100vw, 359px" />This blog post is a transcript of Christian Espinosa&#8217;s explanation of White Box Penetration Testing, which covers the following:</p>
<ul>
<li>Differences between <a href="https://christianespinosa.com/blog/black-box-penetration-testing-explained/" target="_blank" rel="noopener">Black</a>, <a href="https://christianespinosa.com/blog/gray-box-penetration-testing-explained/" target="_blank" rel="noopener">Gray</a>, and White Box Penetration Tests</li>
<li>White Box = Full knowledge about the target</li>
<li>White Box is typically used during development or system integration</li>
<li>Often includes Black and Gray Box</li>
<li>Threats emulated:
<ul>
<li>Poor coding practices</li>
<li>Supply chain issues</li>
</ul>
</li>
</ul>
<p>Check out my latest book: <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener">https://christianespinosa.com/books/the-smartest-person-in-the-room/</a></p>
<p>In Dec 2020, Alpine Security was acquired by Cerberus Sentinel (<a href="https://www.cerberussentinel.com/">https://www.cerberussentinel.com/</a>)</p>
<p>Need a penetration test? Connect with me: <a href="https://christianespinosa.com/cerberus-sentinel/">https://christianespinosa.com/cerberus-sentinel/</a></p>
<p><iframe title="White Box Penetration Testing Explained" width="500" height="281" src="https://www.youtube.com/embed/C3xcvBasJj8?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2>Complete White Box Penetration Testing Video Transcript</h2>
<p>Hello. This is Christian Espinosa with Alpine Security. In this video, we&#8217;ll cover white box penetration tests. This completes our series, the three video series of the different colored boxes of penetration tests. We already did a video on both the black and gray box penetration tests. With a white box penetration test, we know the most about the target. Just a quick review. With a black box, we know very little about the target other than maybe the target&#8217;s IP address or URL. With a gray box, we know a little bit more than a black box. We often have user-level access to the target such as a user-level account on a web application, or maybe an active directory user-level account. With white box though, we know the most about the target. Sometimes with white box, we have root-level or administrator-level permissions.</p>
<p>We also often have access to data-flow diagrams, entity-relationship diagrams, maybe even the source code, maybe even access to the developers that are actually producing the software, or developing the software, or the product. Typically, with a white box penetration test, this is most often used during development of software or a product. It&#8217;s much more beneficial to have somebody from a penetration testing team working with your developers during the development process than waiting until your product is released and then hiring a penetration testing team to poke holes in it after it&#8217;s already been released. It costs a lot more money to fix it, and it&#8217;s much more difficult to fix after it&#8217;s been released. That&#8217;s why a white box is typically done as part of the development cycle for a product or software.</p>
<p>It could also be performed during system integration. Let&#8217;s say you&#8217;re a systems integrator, and you integrate different subsystems from different suppliers. You integrate all that into your overall system. You have to have some degree of trust that your suppliers are actually designing their components to your specifications, and that what you&#8217;re getting from them is secure. So before you integrate that, or as you&#8217;re integrating that into your overall system, you should do some white-box testing to make sure this component you get for instance, only has the inputs you specify, and the outputs you specify. There&#8217;s no extraneous data going through that component or originating from that component.</p>
<p>That would be an example of when we would do a white box penetration test for systems integration. Also, a white box penetration test typically includes a gray box and a black box because as we&#8217;re going through this process, and we&#8217;re looking at what&#8217;s being developed, we often do the test from both the aspect of unauthenticated and user-level access, which is gray. The threats we emulate for a white box, typically we&#8217;re trying to discover poor coding practices. A white box perpetration test, as I mentioned, is typically performed during software development. This is the prime time to discover a input validation problem or a balance checking problem. The perfect opportunity is during the development.</p>
<p>As I mentioned earlier, if we wait to hire the penetration testing team until after development&#8217;s done, and they find out we have a problem such as a input validation or a buffer overflow attack that our software allows to happen because of a vulnerability, that is much more costly to fix than if we could have identified it upfront. The other threat that the white box penetration test helps with is any issues in the supply chain. As I mentioned earlier, we often do white box penetration tests to a systems integrator, so if one of your suppliers in the supply chain has a vulnerability that is introduced somewhere along the supply chain, and that component makes it into your overall system, this is the perfect opportunity to test this before it&#8217;s released again, out to your customers.</p>
<p>If you have any questions about white box penetration testing, you can leave them as a comment beneath this video. If you&#8217;re interested in a white box penetration test, you can contact us at www.alpinesecurity.com. I hope you enjoyed this video, and I&#8217;ll talk to you later on. Cheers.</p>
<p><!--HubSpot Call-to-Action Code --><span id="hs-cta-wrapper-94f60ee8-4fbe-483b-8a0f-ad83ab12a665" class="hs-cta-wrapper"><span id="hs-cta-94f60ee8-4fbe-483b-8a0f-ad83ab12a665" class="hs-cta-node hs-cta-94f60ee8-4fbe-483b-8a0f-ad83ab12a665"><!-- [if lte IE 8]>


<div id="hs-cta-ie-element"></div>


<![endif]--><a href="https://cta-redirect.hubspot.com/cta/redirect/7462611/94f60ee8-4fbe-483b-8a0f-ad83ab12a665" target="_blank" rel="noopener"><img decoding="async" id="hs-cta-img-94f60ee8-4fbe-483b-8a0f-ad83ab12a665" class="hs-cta-img" style="border-width: 0px;" src="https://no-cache.hubspot.com/cta/default/7462611/94f60ee8-4fbe-483b-8a0f-ad83ab12a665.png" alt="Check Out The Smartest Person in The Room" /></a></span><script charset="utf-8" src="https://js.hscta.net/cta/current.js"></script><script type="text/javascript"> hbspt.cta.load(7462611, '94f60ee8-4fbe-483b-8a0f-ad83ab12a665', {"useNewLoader":"true","region":"na1"}); </script></span><!-- end HubSpot Call-to-Action Code --></p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='White Box Penetration Testing Explained' data-link='https://christianespinosa.com/blog/white-box-penetration-testing-explained/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='White Box Penetration Testing Explained' data-link='https://christianespinosa.com/blog/white-box-penetration-testing-explained/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/white-box-penetration-testing-explained/">White Box Penetration Testing Explained</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/white-box-penetration-testing-explained/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
