To sum up the methodology of ethical hacking, what you do is :
- Information gathering (gets the IP, domains, etc…)
- Fingerprint the IP (what OS, what services are running, etc…)
- Vulnerability assessment (are any services or vulnerable application found to be vulnerable ?)
- Exploitation : verify the result of the step above
But, I came to realize during my security audit that end up either asking google questions like “what should I do to hack system A ?” or questions like “what are the tools to assess the security of system A ?”
It’s like looking for a looking for a needle in a haystack.
Then I read a paper in which the audit started with threat modelling. I was just asking myself how would a hacker (either a script kiddy or an ethical hacker) should perform threat modelling in order to have results meaningful to integrate and follow the methodology (info gathering, fingerprinting, vuln assessement, etc…)
I’m starting to believe this would make the security audit more professional and its results more reproducible. What do you think ?
I am in IT and I know: ALL the software in the world are horribly insecure. History proves it (of course prove me wrong!).
So, if we are giving ex.: drones lethal weapons, like bombs, what operating system, what applications, what protocols (to communicate, give orders) are used?
The Q: what audits were done on these elements? Are there any standards?
Did thex ex.: wrote a fully new OS (with tons of secbugs) or took a hardened OpenBSD (but that is just the OS and still could have secbugs)?
A company’s asked me to submit a scan of my passport claiming KYC (Know Your Customer) and AML (Anti-money Laundering) purposes. In times of daily data breaches, would it be genuinely fair to ask such a company to be a little more transparent as to how they protect their clients’ PII (personally identifiable information), for example, by showing—in the form of a periodically-renewed certificate, score sheet, report or conclusion made by an independent company—some evidence of a thoroughly checked infrastructure?
I am in the process of reviewing a SOC2 audit report. From what I can tell, the audit findings all seem straight forward – almost like check boxes. Is it normal to push back and request additional supporting documentation for certain control areas?
Is it good practice to use a table in Postgres as an audit log for login events? The database has other tables like users, posts etc. If the backend receives a failed login, it would insert into the audit table the timestamp, username, action type (in this case failed).
Let’s say that ACME, Inc. is making closed-source software. It’s closed for a reason (they don’t want it leaving their building other than in compiled form). Now, they are hiring some company/person to audit the code for them. How exactly is this done?
If I were ACME, Inc., I would want the audit person (or persons) to come to my physical location, get literally locked into a room with no Internet access, carefully frisked for any USB sticks or any other electronics both when they enter and leave. With cameras recording the screen and the auditor’s face/hands 100% of the time he/she spends in there, which is carefully looked at by my own employees as it happens and/or afterwards.
However, this sounds both demeaning for the person doing the audit, and also unrealistic for anything but the biggest and richest companies. (And with a security-conscious/paranoid CEO.)
I cannot imagine that they just ZIP up their source code tree and e-mail it to the auditor or something similar. Even with encryption and whatnot, this just feels horribly insecure. I would feel as if the second the source code is sent to the auditor remotely, it’s “left the building” and become “potentially public”.
How is this done in practice? Do companies really trust the security of the audit companies? As I type this, I realize how silly that sounds, since they are after all paying them to find flaws in their own code, but still, something about not controlling the whole process just sounds horribly insecure.
I wouldn’t be surprised if you answered that most companies these days just have a “private GitHub repo” to which they grant the auditor access in some GUI. But I would never, ever do that myself…
Are you able to do an Offline Configuration Security Audit of a Meraki Firewall with Nessus Professional?
I will do an advanced SEO audit to highlight all of your website technical SEO errors with the following. Technical Issues – including indexing, nofollow, bad header tags, load speeds, security and more.Structure Issues – including bad internal links, redirects, canonical errors, redirect loops, and moreContent Issues – including thin content, duplicate content, poor keyword optimization, and moreYou’ll receive a thorough report, detailing the issues and problems that need to be fixe. Solution and optimization: I will also optimize your website on-page SEO including the following details. Keywords researchmeta title and descriptionsSitemap XMLrebots.txt for googleGoogle search console and analytics integration
Category: Onsite SEO & Research
I’m trying to understand how to read my SharePoint audit log. We had someone change the permission of a specific group on a folder. When I pull the audit log it shows that the folder permission was updated “Security Role Bind Update) but it doesn’t show how it was updated. Several people over the last 90 days have updated permissions on the folder and we’re trying to specifically find the user who updated the specific group and changed it from contribute to view only, but I don’t see a way to find that information. Is that possible?
I have been in the freelancing for more than 4 years with experiences of the following skill set: 1. SEO Search Engine Optimization Audit > 2.2 Years 2. Lead Generation and List Building > 2 Years Being a Top Rated freelancer on Up Work since I started, shows the quality and accuracy of my work. I have been working with various companies since then and some of them are: 1. Silicon Valley based company called Dynamic Signals California 2. Digital Marketing Labs California 3. Apres.IO California 4. Professional Insurance Experts Texas And many more individual clients and companies around the globe. I love to build long term work relationship with my clients. I did kick off my freelancing career with Professional Insurance Experts LLC and till date I have been working with them. For your reference you are most welcome to visit my profile on Up Work: https://www.upwork.com/o/profiles/users/_~01176685d7bb1ecb65/ Don’t forget to check the reviews from various clients. What I CAN DO FOR YOU IS: 1. Loading Speed Of WEBSITE in Real Time 2. Indexing and crawlability Resources with 4xx status code Resources with 5xx status code Resources restricted from indexing 404 page set up correctly robots.txt file .xml sitemap 3. Redirects Fixed www and non-www versions Issues with HTTP/HTTPS site versions Pages with 302 redirect Pages with 301 redirect Pages with long redirect chains Pages with meta refresh Pages with rel=”canonical” 4. Encoding and technical factors Mobile friendly HTTPS pages with mixed content issues Pages with multiple canonical URLs Pages with Frames Pages with W3C HTML errors and warnings Pages with W3C CSS errors and warnings Too big pages 5. URLs Dynamic URLs Too long URLs 6. Links Broken links Pages with excessive number of links Dofollow external links 7. Images Broken images Empty alt text 8. On-page Empty title tags Duplicate titles Too long titles Empty meta description Duplicate meta descriptions Too long meta description 9. Localization Language Versions Pages with hreflang elements Incorrect language codes Invalid URLs Missing return links Conflicting hreflang elements Non-canonical pages with hreflang elements Missing “x-default” values Incomplete hreflang values
Category: Onsite SEO & Research