<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Tristan’s Cybersecurity Substack]]></title><description><![CDATA[Hello and welcome to my blog where I talk about my interests and try to provide useful information on multiple subjects in Information Technology, mainly on coding and InfoSec.
https://bsky.app/profile/tristandostaler.bsky.social]]></description><link>https://www.tristandostaler.com</link><image><url>https://substackcdn.com/image/fetch/$s_!j9n6!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F65221642-d51c-4583-a96e-a8b1618617b8_1280x1280.png</url><title>Tristan’s Cybersecurity Substack</title><link>https://www.tristandostaler.com</link></image><generator>Substack</generator><lastBuildDate>Fri, 01 May 2026 03:03:11 GMT</lastBuildDate><atom:link href="https://www.tristandostaler.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Tristan Dostaler]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[tristandostaler@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[tristandostaler@substack.com]]></itunes:email><itunes:name><![CDATA[Tristan Dostaler]]></itunes:name></itunes:owner><itunes:author><![CDATA[Tristan Dostaler]]></itunes:author><googleplay:owner><![CDATA[tristandostaler@substack.com]]></googleplay:owner><googleplay:email><![CDATA[tristandostaler@substack.com]]></googleplay:email><googleplay:author><![CDATA[Tristan Dostaler]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[SIEM 201 — Automating Threat Response: A Practical Guide]]></title><description><![CDATA[Introduction &#8212; The Case for Automated Response]]></description><link>https://www.tristandostaler.com/p/siem-201-automating-threat-response</link><guid isPermaLink="false">https://www.tristandostaler.com/p/siem-201-automating-threat-response</guid><dc:creator><![CDATA[Tristan Dostaler]]></dc:creator><pubDate>Tue, 22 Apr 2025 12:03:26 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/161737267/a52e94009919dabbff367ced95291922.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Jic_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F362a1acf-dd67-4cf2-9e3a-fb013cf8a90a_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Jic_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F362a1acf-dd67-4cf2-9e3a-fb013cf8a90a_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!Jic_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F362a1acf-dd67-4cf2-9e3a-fb013cf8a90a_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!Jic_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F362a1acf-dd67-4cf2-9e3a-fb013cf8a90a_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!Jic_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F362a1acf-dd67-4cf2-9e3a-fb013cf8a90a_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Jic_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F362a1acf-dd67-4cf2-9e3a-fb013cf8a90a_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/362a1acf-dd67-4cf2-9e3a-fb013cf8a90a_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2333503,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.tristandostaler.com/i/161675389?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F362a1acf-dd67-4cf2-9e3a-fb013cf8a90a_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!Jic_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F362a1acf-dd67-4cf2-9e3a-fb013cf8a90a_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!Jic_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F362a1acf-dd67-4cf2-9e3a-fb013cf8a90a_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!Jic_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F362a1acf-dd67-4cf2-9e3a-fb013cf8a90a_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!Jic_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F362a1acf-dd67-4cf2-9e3a-fb013cf8a90a_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>Introduction &#8212; The Case for Automated Response</strong></h2><p>If your SIEM only sends alerts, you're leaving value&#8212;and security&#8212;on the table.<br><br>In every incident I&#8217;ve investigated, there&#8217;s a window between detection and response that determines the scale of impact. In some cases, this delay is a matter of hours, sometimes minutes. But in fast-moving attacks like ransomware deployment, credential stuffing, or lateral movement, seconds might be all it takes to go from contained to compromised.<br><br>That&#8217;s where automated response comes in.</p><p>Rather than waiting for someone to read a Slack message or open their inbox, a well-placed automation can block an attacker IP, disable a vulnerable user, or trigger a workflow instantly. When configured right, automation gives defenders their time back&#8212;and gives attackers one chance less.<br><br>In this post, I&#8217;ll show you how to implement effective, low-risk automated actions in your SIEM. I&#8217;ll walk through examples like blocking brute force source IPs, sending adaptive notifications, and integrating webhooks. You don&#8217;t need a full SOAR platform to take meaningful action. You just need a reliable alert, a clear goal, and good guardrails.<br><br>Let&#8217;s explore what&#8217;s possible when your alerts don&#8217;t just end in a ticket&#8212;they end in action.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.tristandostaler.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Tristan&#8217;s Cybersecurity Substack is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h2><strong>What You Can Automate (and Why It Helps)</strong></h2><p>Automated response in your SIEM doesn&#8217;t have to mean deploying a full SOAR platform. Even with basic webhook support, you can trigger meaningful actions when alerts match the right conditions. Here's a breakdown of the most common types of automated actions&#8212;each with practical benefits and varying levels of risk.</p><div><hr></div><h3>1. Send a Notification (Email, Slack, Teams)</h3><p>&#128994; Low-friction, low-risk</p><p>This is the simplest form of automation.</p><p>Your SIEM detects something unusual&#8212;like a user logging in from a suspicious IP&#8212;and sends a message to your Slack channel or a dedicated security inbox.</p><p>This doesn't stop anything yet, but it dramatically shortens response time by reaching humans faster (and in the right place).<br><br>&#128073; Example:</p><ul><li><p>Alert: Office login from TOR node</p></li><li><p>Action: Send message to #sec-team on Slack with a link to verify user</p></li></ul><div><hr></div><h3> 2. Trigger a Webhook or API Call</h3><p> &#128993; Medium complexity, highly flexible</p><p>If your SIEM supports webhooks or external HTTP calls, you can trigger actions beyond notifications. For instance, you could call a small API you wrote that places an IP in your firewall&#8217;s blocklist, or notify a central webhook handler in your detection pipeline.</p><p>&#128073; Example:</p><ul><li><p>Alert: Multiple failed SSH attempts from a single IP</p></li><li><p>Action: Send that IP to an internal API that appends it to iptables ban list via fail2ban</p></li></ul><p>(This is the type I use most, and I&#8217;ll walk through it later in the blog.)</p><div><hr></div><h3> 3. Execute a Script or Runbook</h3><p>&#128992; Higher risk, more automation</p><p>Some systems can run a script directly in response to an alert&#8212;especially if you&#8217;re using a SIEM combined with an EDR or agent on the machine. This could restart a process, disable a user account, or isolate a host.</p><p>While powerful, scripts need rigorous testing. Misfires can create outages.</p><p>&#128073; Example:</p><ul><li><p>Alert: PsExec lateral movement detected</p></li><li><p>Action: Run PowerShell to isolate the machine from the domain</p></li></ul><p>&#128161; Tip: These are best combined with tagging or human-in-the-loop review at first.</p><div><hr></div><h3> 4. Push to a Ticketing System or IR Workflow Tool</h3><p>&#128994; Low-to-medium risk, includes humans</p><p>Another useful automation is pushing summarized alert data into your incident response or case management platform (like Jira, TheHive, PagerDuty, etc.). This ensures follow-up, adds context, and lets responders add manual judgment without missing the event.</p><p>&#128073; Example:</p><ul><li><p>Alert: Phishing link clicked</p></li><li><p>Action: Open case in TheHive with log URLs, domain observed, user&#8217;s IP</p></li></ul><div><hr></div><h2>Real-World Use Cases (That Aren&#8217;t Too Risky)</h2><p>Getting started with SIEM automation doesn&#8217;t mean plugging your alert pipeline straight into production-blocking scripts. That&#8217;s a great way to lock yourself out of an important service&#8212;or worse, cause a false positive outage. I like to start with low-friction, high-confidence alerts with clear outcomes.</p><p>Here are some use cases I&#8217;ve implemented or advised others to adopt first:</p><div><hr></div><h3>&#128683; Block Brute-Force IPs Automatically</h3><p>Brute force attempts are a perfect starter for automation because they&#8217;re noisy, repetitive, and usually easy to fingerprint.</p><p>&#129504; Trigger:</p><p>An alert that detects 10+ failed SSH or Windows logon attempts from the same IP within 5 minutes.</p><p>&#9881;&#65039; Action:</p><p>Send a webhook to a lightweight API receiving bad IPs, which in turn updates your firewall, fail2ban, or a zero-trust ACL.</p><p>&#9989; Why It Works:</p><ul><li><p>You can whitelist trusted IP ranges up front</p></li><li><p>Blocking via firewall doesn&#8217;t affect internal systems</p></li><li><p>These attacks are usually automated and follow patterns</p></li></ul><div><hr></div><h3>&#127757; GeoIP + Impossible Travel Notifications</h3><p>User logs in from Toronto. Three minutes later, they try accessing a sensitive application from Singapore. Unless they have a teleportation pod, something's wrong.</p><p>&#129504; Trigger:</p><p>Alert when two logins are detected from geographically distant locations within an impossible timeframe.</p><p>&#9881;&#65039; Action:</p><ul><li><p>Automatically send a Slack message or email to the affected user&#8217;s manager</p></li><li><p>Optionally open a ticket in the incident response system</p></li></ul><p>&#9989; Why It Works:</p><ul><li><p>No impact, just visibility</p></li><li><p>Helps build context if ongoing investigation is needed</p></li></ul><div><hr></div><h3>&#129514; Tagging or Labeling High-Risk Hosts</h3><p>Not all automations need to stop attackers directly. You can enrich telemetry by tagging things as risky the moment they're detected.</p><p>&#129504; Trigger:</p><p>Host exhibits lateral movement behavior (e.g., PsExec or WMIExec detection via Sysmon)</p><p>Or: Endpoint shows signs of crypto-ransomware behavior</p><p>&#9881;&#65039; Action:</p><p>Attach a tag to the host in your log system or asset tracker</p><p>Or: write an enrichment flag in Sentinel/Humio to surface in dashboards</p><p>&#9989; Why It Works:</p><ul><li><p>Non-destructive</p></li><li><p>Makes hunting and triage faster</p></li><li><p>Builds starting points for weekly reviews or ML training</p></li></ul><div><hr></div><p>These ideas are deliberately safe to start with. As you implement these and trust their accuracy, you can progressively increase risk tolerance and expand to more disruptive actions (like user disabling or host isolation).</p><div><hr></div><h2>Hands-On Example: Blocking an IP from a Humio Alert</h2><p>Let&#8217;s walk through a real-world example: a brute force detection alert that automatically blocks the source IP by sending it to a small script via webhook.</p><p>This approach works with any SIEM that supports HTTP-based alert actions&#8212;Humio makes it simple, but you could do the same with Logz.io, Graylog, or even a homegrown setup.</p><div><hr></div><p>&#127919; The Goal</p><ul><li><p>Detect failed login attempts coming from a single IP more than 10 times in 5 minutes.</p></li><li><p>When that happens, send the IP to a webhook endpoint.</p></li><li><p>The webhook triggers a script to block the IP on the firewall.</p></li><li><p>The action is logged, monitored, and reversible.</p></li></ul><p>Low risk, high reward.</p><div><hr></div><h3>&#128450; Step 1: Create the Detection Query in Humio</h3><p>In Humio or your SIEM, build the alert like this.</p><p>Query Example (Sysmon/Winlogbeat logs):</p><pre><code><code>event.code=4625 
| groupby([beat_agent.hostname, winlog.event_data.IpAddress], function=count()) 
| where([count &gt; 10]) </code></code></pre><p>This detects 10+ failed login attempts from the same source IP on the same host.</p><p>&#128269; Tips:</p><ul><li><p>Avoid internal IPs or your own jump-boxes by filtering with where(not winlog.event_data.IpAddress in (your allowlist))</p></li><li><p>Tune down to 5 attempts in testing, tune up to 20+ in prod</p></li></ul><div><hr></div><h3>&#9888;&#65039; Step 2: Configure the Alert Action</h3><p>In Humio:</p><ul><li><p>Go to Alerts</p></li><li><p>Choose your query, click &#8220;Create Alert&#8221;</p></li><li><p>Set threshold = 1 (fires whenever there&#8217;s a matching group)</p></li><li><p>Throttle: &gt;5 mins per host+IP tuple</p></li></ul><p>Action Setup (Webhook):</p><ul><li><p>Type: &#8220;HTTP POST&#8221;</p></li><li><p>URL: https://your-automation-host/api/block-ip</p></li><li><p>Payload:</p></li></ul><pre><code><code>{
  "hostname": "{{beat_agent.hostname}}",
  "ip": "{{winlog.event_data.IpAddress}}"
}</code></code></pre><p>&#10004;&#65039; Set content-type as application/json</p><p>&#10004;&#65039; Secure it with an API key in the header, or only allow network-restricted source IPs</p><div><hr></div><h3>&#128736; Step 3: Write the Webhook Script</h3><p>Here&#8217;s a very simple example in Python (Flask-based API):</p><pre><code><code>from flask import Flask, request, jsonify
import subprocess
import logging

app = Flask(__name__)
logging.basicConfig(filename='ipblocks.log', level=logging.INFO)

@app.route('/api/block-ip', methods=['POST'])
def block_ip():
    data = request.json
    ip = data.get('ip')

    # Validate the IP (simple check)
    # This is not enough to safeguards against RCE.
    # TODO: add more checks!
    # This is only an example!
    if not ip or '..' in ip or '/' in ip or ';' in ip or '&amp;' in ip or '|' in ip:
        return jsonify({"error": "invalid IP"}), 400

    # Block the IP using iptables (Linux)
    # One would imagine a CTF challenge here!
    cmd = f"iptables -A INPUT -s {ip} -j DROP"
    subprocess.run(cmd, shell=True)

    logging.info(f"Blocked IP {ip} via automation")
    return jsonify({"status": "blocked", "ip": ip})</code></code></pre><p>&#128161; Save and run this on a secured automation server. Rotate IPs out after X days or add removal logic.</p><p>Alternatives:</p><ul><li><p>Use UFW, fail2ban custom chains, or cloud firewall/blocklist APIs (e.g., AWS, Cloudflare)</p></li><li><p>If you don&#8217;t want actual blocking: just log or simulate the response action!</p></li></ul><div><hr></div><h3>&#128270; Step 4: Monitor &amp; Tune</h3><p>Now that you&#8217;ve automated your first response, be sure to:</p><ul><li><p>Log every action (separate audit file or SIEM event)</p></li><li><p>Monitor alerts for false positives&#8212;adjust thresholds</p></li><li><p>Use alert &#8220;Preview&#8221; and dry runs to test</p></li><li><p>Sanitize inputs and control webhook access</p></li></ul><p>Optional additions:</p><ul><li><p>Store blocked IPs in SQLite or Redis to allow removal later</p></li><li><p>Add Slack/Email alerts from the script for visibility</p></li></ul><div><hr></div><p>&#128272; Bonus: Add a Safety Switch</p><p>Build a toggle in the script (&#8220;MAINTENANCE_MODE=True&#8221;) that allows you to disable enforcement instantly. Or only allow from specific alert sources (e.g., trusted Humio instance UUIDs).</p><div><hr></div><p>&#127881; Boom &#8212; you&#8217;ve now built an early warning system that defends itself.</p><p>Up next, we&#8217;ll talk about how to scale this approach and avoid common mistakes.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.tristandostaler.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.tristandostaler.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><h2>Best Practices &amp; Guardrails</h2><p>Before you get too deep into automating blockade systems and forensic scripts, let&#8217;s cover the most important part of any automation effort: treating it like production code.</p><p>Automated actions affect your systems&#8212;sometimes permanently. Without proper guardrails, a bug in detection or a misfiring rule could put your security team in the spotlight for all the wrong reasons. Here's how to do it right.</p><div><hr></div><h3>&#9989; 1. Start with Notifications, Then Actions</h3><p>The temptation to go straight from alert to action is real&#8212;but don&#8217;t skip the dry run phase.</p><p>Always begin by triggering a notification or logging-only action, and monitor the alert fidelity over time. Only after verifying that your false positive rate is low should you consider moving to blocking or remediation automation.</p><p>&#128221; Pro tip:</p><p>&#8220;Log + Notify + Review&#8221; for a week before enabling the final blocking logic.</p><div><hr></div><h3>&#128737; 2. Whitelist Known Good Behavior</h3><p>Always protect critical systems, known testers, and internal IPs from being impacted by automated actions unless absolutely required. You&#8217;ll want to include a whitelist&#8212;either inline or backend-controlled&#8212;which the automation must check before enforcement.</p><p>Examples:</p><ul><li><p>Don&#8217;t block your VPN endpoint</p></li><li><p>Don&#8217;t isolate your own monitoring agent</p></li><li><p>Don&#8217;t trigger changes on development or staging logs</p></li></ul><div><hr></div><h3>&#129514; 3. Log Everything the Automation Does</h3><p>If your automation blocks an IP, disables a user, or restarts a service, you need a clear audit trail of:</p><ul><li><p>What triggered the action</p></li><li><p>When it ran</p></li><li><p>What was actually done</p></li><li><p>Who or what performed it</p></li><li><p>Whether it succeeded or failed</p></li></ul><p>&#128193; Tip: Log all of this to your SIEM itself.</p><p>Bonus: Create a dashboard of recent automation actions to catch errors early.</p><div><hr></div><h3>&#128257; 4. Add Rate Limiting and Throttling</h3><p>Just because 50 alerts fire at once doesn&#8217;t mean you want 50 API calls and actions firing simultaneously.</p><p>Add throttling&#8212;or use your SIEM&#8217;s built-in alert throttle&#8212;to avoid alert storms. This ensures you don&#8217;t overwhelm your firewall with too many rule changes or bounce through rate limits on an external system.</p><p>&#128207; Example:</p><p>Only execute the action once per unique IP per hour, or once per system per 10 minutes.</p><div><hr></div><h3>&#128258; 5. Make It Reversible (and Pauseable)</h3><p>You WILL make a mistake. Your automation might react to a misparsed event or a data ingestion bug.</p><p>Plan for rollback. Here&#8217;s how much:</p><ul><li><p>Can you remove a blocked IP with a single call?</p></li><li><p>Is there a safe list to re-allow access?</p></li><li><p>Can you &#8220;pause&#8221; automation with one toggle if you&#8217;re under pressure?</p></li></ul><p>Most mistakes in security are made in fear. Don&#8217;t let your automation increase panic&#8212;build kill switches and clear recovery steps.</p><div><hr></div><p>Automating threat response means trusting your SIEM&#8217;s alerts with real power. These best practices are like a flight checklist: they ensure it flies where and when you want it to&#8212;and lands safely when it&#8217;s done.</p><p>Up next, let&#8217;s look at the typical automation pitfalls I see in the wild&#8212;and how you can avoid them.</p><div><hr></div><h2>Common Pitfalls to Avoid</h2><p>When I talk to teams about SIEM automation, they&#8217;re usually excited. And with good reason&#8212;automation turns alerts into actions and allows teams to scale. But I&#8217;ve also seen well-meaning automation wreak havoc because a few basic rules were overlooked.</p><p>Here are the most common mistakes I see when teams launch automated responses too early&#8212;or without thinking through the consequences.</p><div><hr></div><h3>&#128257; Acting on Noisy Alerts</h3><p>This is the classic mistake: building automations on top of alerts that still generate false positives. If your brute force alert is misfiring, feeding it into an auto-blocking script will just create chaos.</p><p>You might end up:</p><ul><li><p>Blocking your own security scanner</p></li><li><p>Disabling perfectly legitimate logins</p></li><li><p>Filling your firewall ruleset unnecessarily</p></li></ul><p>&#128721; Fix it first: Make sure your detection logic is solid, tuned, and meaningful before giving it power.</p><p>&#128161; Pro tip: Review fired alerts over 7&#8211;14 days before moving to response.</p><div><hr></div><h3>&#127786; Forgetting Alert Throttling</h3><p>Without rate limiting, a flood of log-ins from one device, a SIEM parsing bug, or log ingestion issue could trigger hundreds of simultaneous actions.</p><p>I once saw a mis-parsed Linux event trigger 300+ alerts in under 60 seconds&#8212;which then triggered an overload in the iptables automation service.</p><p>&#10004; Add guardrails:</p><ul><li><p>Alert throttling (native in many SIEMs)</p></li><li><p>IP block counters (rate-limits per source)</p></li><li><p>Timeout queues on your action scripts</p></li></ul><div><hr></div><h3>&#128065;&#65039; No Visibility on What&#8217;s Happening</h3><p>If you're not logging the actions taken&#8212;or you&#8217;re only logging success&#8212;you&#8217;re working blind.</p><p>Imagine:</p><ul><li><p>You blocked 42 IPs&#8230; but which ones?</p></li><li><p>A script failed to run&#8230; was it retried?</p></li><li><p>Someone paused your webhook host&#8230; and now no action is running</p></li></ul><p>&#127775; Always log:</p><ul><li><p>What triggered the action (alert details)</p></li><li><p>What was attempted (API call, command)</p></li><li><p>The result (success/failure)</p></li></ul><p>Put this in a shared log store, or even feed &#8220;meta events&#8221; to the SIEM itself.</p><div><hr></div><h3>&#128274; No Authentication or Input Validation</h3><p>If your webhook is listening for JSON from anywhere&#8212;make sure it's authentic.</p><p>Imagine an attacker figures out your webhook URL&#8230; and submits their own IP with your same automation call. Or worse, they inject shell code as part of a manipulated payload.</p><p>Secure your endpoints:</p><ul><li><p>API keys or HMAC validation</p></li><li><p>Restrict source IP to the SIEM only</p></li><li><p>Sanitize all fields before running commands</p></li></ul><p>If you're passing variables into a shell script, validate and escape everything.</p><div><hr></div><h3>&#129512; Over-Automating Detonation</h3><p>Some teams go all-in: "If this alert fires, disconnect the user, disable the account, and terminate the EC2 instance."</p><p>That&#8217;s tempting, but only safe at maturity. Without escalation logic, human review, or an understanding of business impact, automation might react more aggressively than intended.</p><p>Instead:</p><ul><li><p>Automate gently (alert, log, escalate)</p></li><li><p>Use tagging, enrichment, and visibility automation</p></li><li><p>Add human-in-the-loop steps before destructive actions</p></li></ul><p>You can scale trust with automation&#8212;but only if everyone trusts it over time.</p><div><hr></div><h3>TL;DR &#8212; Don&#8217;t Put a Bazooka on an Alert Until it Knows What It&#8217;s Aiming At</h3><p>Automation is powerful&#8212;but only when it obeys the rules of reliability, auditability, and control. Treat your response logic like a developer treats production code: observability, rollback, and safety nets should always be included.</p><div><hr></div><h2>Where to Go From Here</h2><p>You&#8217;ve built one automation, logged its behavior, and avoided tripping your own firewalls&#8212;great work. Now what?</p><p>One of the strengths of building lean, scriptable SIEM automations is that you can grow them gradually. The goal isn&#8217;t to automate everything. It&#8217;s to automate the right things consistently and recoverably.</p><p>Here&#8217;s how to take your setup further:</p><div><hr></div><h3>&#129520; 1. Expand Your Webhook Handler</h3><p>Don&#8217;t let your blocking script do just one thing. You can support more actions using conditional logic:</p><ul><li><p>Block an IP</p></li><li><p>Put a tag in a shared asset tracker</p></li><li><p>Write a note into a shared Google Sheet or case system</p></li><li><p>Notify an MDR or response team externally</p></li><li><p>Populate a blocklist file or feed</p></li></ul><p>Small automations like this scale well and create glue between tools.</p><p>&#128736; Tip: Build modularly &#8212; write clean, multi-source-capable input handlers and you won&#8217;t need to rebuild later.</p><div><hr></div><h3>&#127913; 2. Integrate with Your Ticketing or Workflow Tool</h3><p>If you&#8217;re not ready to block things automatically, pipe your alert context into your response platform.</p><p>Examples:</p><ul><li><p>Create a Jira ticket for phishing-link clicks</p></li><li><p>Trigger a case in TheHive for suspicious process chains</p></li><li><p>Send markdown-formatted incident summaries to Mattermost</p></li></ul><p>This acts as &#8220;automated assurance&#8221;&#8212;you won&#8217;t forget the incident, and responders can add human judgment if needed.</p><div><hr></div><h3>&#128260; 3. Enrich Alerts &#8212; Not Just Respond</h3><p>Your SIEM should grow more informed over time.</p><p>When an alert fires, automation doesn&#8217;t have to only take action. It can:</p><ul><li><p>Append GeoIP context based on source IP</p></li><li><p>Mark an asset&#8217;s risk score in the SIEM</p></li><li><p>Add domain reputation or VirusTotal score</p></li><li><p>Link to previous similar alerts</p></li></ul><p>Automation = context at machine speed.</p><div><hr></div><h3>&#129504; 4. Create a Lightweight &#8220;SOAR Without SOAR&#8221;</h3><p>If you&#8217;re not buying a full commercial SOAR (Security Orchestration, Automation and Response) platform, you&#8217;re not alone.</p><p>With the right stack, you can build your own SOAR-lite with:</p><ul><li><p>Your SIEM alerting engine (Humio, Elasticsearch, etc.)</p></li><li><p>A webhook layer / action handler (Flask, Lambda, etc.)</p></li><li><p>Basic storage (SQLite, Google Sheets, JSON-logs)</p></li><li><p>Dashboards or markdown playbooks</p></li></ul><p>This gives you enough control and extensibility for most use cases&#8212;especially in a small or mid-size team.</p><p>&#128221;My blog used this model before the move to Substack. Works well. Cost? $0.</p><div><hr></div><h3>&#128301; 5. Experiment, Measure, and Refine</h3><p>Great SIEM automations are never built in one pass. I recommend:</p><ul><li><p>Logging every action, even if it &#8220;does nothing&#8221;</p></li><li><p>Holding monthly reviews of automation performance (e.g. top 10 triggered rules)</p></li><li><p>Keeping a chart of false positives vs. enforcement success</p></li><li><p>Versioning your detection + automation rules together</p></li></ul><p>This turns security automation into a feedback loop&#8212;not just a trigger.</p><div><hr></div><h2>Conclusion</h2><p>Security automation isn&#8217;t reserved for large enterprises or teams with a SOAR budget. You don&#8217;t need to over-invest, overbuild, or over-trust untested systems.</p><p>With just a few hours and the right SIEM alert, you can build useful automations that:</p><ul><li><p>Respond faster to obvious threats (like brute-force attempts)</p></li><li><p>Help defenders focus on high-value work</p></li><li><p>Reduce fatigue from repetitive incidents</p></li></ul><p>Whether you're defending your home lab, managing detection pipelines for clients, or running SecOps in a growing organization, your SIEM can do more than notify&#8212;it can act.</p><p>Start with one use case. Get it right. Monitor its behavior. And when you&#8217;re confident, scale it up to your next alert. You&#8217;ll be amazed at how quickly &#8220;just an alert&#8221; becomes something that actually helps you sleep at night.</p><p>If you&#8217;d like to explore more, I&#8217;ve also written about detecting PsExec lateral movement, configuring alert thresholds, or tuning SIEM correlation rules to reduce false positives.</p><p>&#9745; Build one automation. Review. Repeat.</p><div><hr></div><p>&#127919; Want more hands-on detection walkthroughs and security strategies?</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.tristandostaler.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.tristandostaler.com/subscribe?"><span>Subscribe now</span></a></p><p>to get the next blog posts as I publish them!</p><p>&#8212;</p><p>&#128172; Did you try an automation and learn something from it? Share it in the comments! I&#8217;d love to hear it.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.tristandostaler.com/p/siem-201-automating-threat-response/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.tristandostaler.com/p/siem-201-automating-threat-response/comments"><span>Leave a comment</span></a></p><p>&#8212;</p><p>&#128236; Need help building detection + action pipelines for your team? I run detection engineering for MDR platforms and help teams implement lightweight but effective automation. Feel free to reach out.</p><div class="directMessage button" data-attrs="{&quot;userId&quot;:266637641,&quot;userName&quot;:&quot;Tristan Dostaler&quot;,&quot;canDm&quot;:null,&quot;dmUpgradeOptions&quot;:null,&quot;isEditorNode&quot;:true}" data-component-name="DirectMessageToDOM"></div><h3>&#129505; Donation</h3><p>If you like my blog and my posts, please consider donating!</p><p>Imagine this: each minute of reading a post takes about 1&#8211;2 hours to create!</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://buymeacoffee.com/tristandostaler&quot;,&quot;text&quot;:&quot;Donate &#129505;&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://buymeacoffee.com/tristandostaler"><span>Donate &#129505;</span></a></p>]]></content:encoded></item><item><title><![CDATA[The Elasticsearch license saga]]></title><description><![CDATA[Listen now (11 mins) | Explore the recent licensing change made by Elastic, the company behind Elasticsearch and Kibana, and its impact on the open-source community. This post explains the benefits of Elasticsearch, the community backlash following the adoption of the SSPL license, and how AWS and other players responded with the OpenSearch fork. Understand the shift from Apache 2.0 to SSPL, the motivations behind it, and why it sparked concern across the industry.]]></description><link>https://www.tristandostaler.com/p/the-elasticsearch-license-saga</link><guid isPermaLink="false">https://www.tristandostaler.com/p/the-elasticsearch-license-saga</guid><dc:creator><![CDATA[Tristan Dostaler]]></dc:creator><pubDate>Mon, 18 Nov 2024 14:02:02 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/151820913/5e3858de984d6dd47da6d49a19434cba.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>As you may know <a href="https://www.tristandostaler.com/siem-101-basic-usage/">from my posts</a>, I like Elasticsearch. However, <a href="https://www.elastic.co/">Elastic</a>, the Elasticsearch company, recently announced it's decision to change the license of it's open-source products. Since then, the community largely reacted to this. Let me explain.</p><h2>Benefits of Elasticsearch</h2><p>Customers and the open-source community enjoyed a variety of services offered by Elastic through its products (like Elasticsearch). <a href="https://medium.com/@AIMDekTech/what-is-elasticsearch-why-elasticsearch-advantages-of-elasticsearch-47b81b549f4d">Elasticsearch</a> is a distributed search engine providing a number of features that make data processing more efficient and effective while maintaining its ability of scalability, speed and resilience. Elasticsearch through its partner product Kibana, Beats and Logstash provide a simplified way of data visualization, ingest and reporting. The other very reliable feature is its distributable nature which allows it to handle a huge size of data without compromising performance. It provides a real-time search platform which provide the shortest time possible when a user makes a search.</p><p>The open-source community contributes much on this product through various ways like providing codes and documentation, bugs report, write of tutorial, blogs etc. Elasticsearch was providing the code under the <a href="https://www.apache.org/licenses/LICENSE-2.0">Apache v2 license</a>. All this makes everyone feel the meaning of "open" in "open-source". A report by <a href="https://www.macrotrends.net/stocks/charts/ESTC/elastic/net-worth">macrotrends</a> shows that the company net worth from 2018-2020 is estimated as $14.33B. This is an indication of how big the customer base is, and the revenue generated help contribute to the open-source community.</p><h2>The context</h2><p>On February 27&#8217;th 2018, the Elastic company CEO, Shay Banon, <a href="https://www.elastic.co/blog/doubling-down-on-open">delivered a message</a> on their website that mealy read as an announcement for the release of the new repository for their products on the version 6.3. A new folder in the code, named X-Pack, was created and all the proprietary product code moved to that folder under the <a href="https://github.com/elastic/elasticsearch/blob/0d8aa7527e242fbda9d84867ab8bc955758eebce/licenses/ELASTIC-LICENSE.txt">elastic license</a> which many customer and open-source code community believed that was a way of facilitating greater collaboration.</p><p>He affirmed that their products had to be open source hence providing the opportunity to reach so many people who can provide their contribution through various ways and even enable a push for what was seen, at the time, as a pipe dream. He even committed himself that as a company they will ever maintain to be open as a way of building their business.</p><p>However, on January 14'th 2021, Shay Banon <a href="https://www.elastic.co/blog/licensing-change">announced</a> that they were moving away from the truly open-source license (Apache v2) to the newer <a href="https://www.mongodb.com/licensing/server-side-public-license">Server Side Public License</a> (SSPL). The open-source community was shocked to realize that in order to use the Elastic products, you now had to agree to the terms and conditions of the SSPL or the elastic license. The former as new as it looks deprive the organizations of their intellectual property rights when observed from the spirit of "open source" in the business environment:</p><blockquote><p>By using an SSPL project in your code, you are agreeing that if you provide an online service using that code then you will release not only that code but also the code for every supporting piece of software, all under the SSPL. It&#8217;s not a stretch to interpret the wording of the license as requiring users of the SSPL&#8217;d software therefore to release the code for everything straight down to the bare metal.</p><p><a href="https://anonymoushash.vmbrasseur.com/2021/01/14/elasticsearch-and-kibana-are-now-business-risks">https://anonymoushash.vmbrasseur.com/2021/01/14/elasticsearch-and-kibana-are-now-business-risks</a></p></blockquote><p>From Elastic's website:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TAjP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea48abd4-fa4a-4dc2-8e0c-94aa8a371f25_779x577.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TAjP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea48abd4-fa4a-4dc2-8e0c-94aa8a371f25_779x577.png 424w, https://substackcdn.com/image/fetch/$s_!TAjP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea48abd4-fa4a-4dc2-8e0c-94aa8a371f25_779x577.png 848w, https://substackcdn.com/image/fetch/$s_!TAjP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea48abd4-fa4a-4dc2-8e0c-94aa8a371f25_779x577.png 1272w, https://substackcdn.com/image/fetch/$s_!TAjP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea48abd4-fa4a-4dc2-8e0c-94aa8a371f25_779x577.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TAjP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea48abd4-fa4a-4dc2-8e0c-94aa8a371f25_779x577.png" width="779" height="577" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ea48abd4-fa4a-4dc2-8e0c-94aa8a371f25_779x577.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:577,&quot;width&quot;:779,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:118057,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!TAjP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea48abd4-fa4a-4dc2-8e0c-94aa8a371f25_779x577.png 424w, https://substackcdn.com/image/fetch/$s_!TAjP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea48abd4-fa4a-4dc2-8e0c-94aa8a371f25_779x577.png 848w, https://substackcdn.com/image/fetch/$s_!TAjP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea48abd4-fa4a-4dc2-8e0c-94aa8a371f25_779x577.png 1272w, https://substackcdn.com/image/fetch/$s_!TAjP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea48abd4-fa4a-4dc2-8e0c-94aa8a371f25_779x577.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><a href="https://www.elastic.co/pricing/faq/licensing">https://www.elastic.co/pricing/faq/licensing</a></figcaption></figure></div><h2>Why this move to the new SSPL Elasticsearch license</h2><p>The elastic company felt that &#8220;<a href="https://www.elastic.co/blog/why-license-change-AWS">enough is enough</a>&#8221; and that they should protect its product from cloud service providers whose intention was to capture the value of the same product while contributing nothing to the open-source community, as expressed by Eliot Horowitz, CTO and co-founder of MongoDB. Together with elastic&#8217;s CEO, they felt that companies like Amazon that are providing this product as a <a href="https://en.wikipedia.org/wiki/Software_as_a_service">Software as a Service</a>, without the knowledge or the consent of the Elastic company while misleading the community that they are, is "not ok". They tried and didn't succeed to resolve this issue through courts.</p><h2>A new hope</h2><p>In response, <a href="https://aws.amazon.com/blogs/opensource/stepping-up-for-a-truly-open-source-elasticsearch/">AWS announced</a> that it will create and maintain an Apache v2 licensed fork of Elastisearch and Kibana. They further expressed that the choice to fork a project was the right path forward when the community needs are diverging. To emphasize it, they stated that they are in the game for a long haul and ready to work in a way that will create a healthy and sustainable open-source practice.</p><p><a href="https://logz.io/blog/open-source-elasticsearch-doubling-down/">Logz.io</a> joined the fray and expressed their concern as to why they think the change of license from Elastic, at the expense of the open-source community, is &#8220;not OK&#8221;. In a retaliatory tone, they gave their objective to have projects driven by multiple organizations rather than a single commercial entity and plans to collaborate with such organizations (like Amazon) that believe that those products, Elasticsearch and Kibana, need to stay open source.</p><h3>References</h3><ul><li><p><a href="https://anonymoushash.vmbrasseur.com/2021/01/14/elasticsearch-and-kibana-are-now-business-risks">https://anonymoushash.vmbrasseur.com/2021/01/14/elasticsearch-and-kibana-are-now-business-risks</a></p></li><li><p><a href="https://www.elastic.co/blog/doubling-down-on-open">https://www.elastic.co/blog/doubling-down-on-open</a></p></li><li><p><a href="https://medium.com/@AIMDekTech/what-is-elasticsearch-why-elasticsearch-advantages-of-elasticsearch-47b81b549f4d">https://medium.com/@AIMDekTech/what-is-elasticsearch-why-elasticsearch-advantages-of-elasticsearch-47b81b549f4d</a></p></li><li><p><a href="https://www.elastic.co/blog/why-license-change-AWS">https://www.elastic.co/blog/why-license-change-AWS</a></p></li><li><p><a href="https://aws.amazon.com/blogs/opensource/stepping-up-for-a-truly-open-source-elasticsearch/">https://aws.amazon.com/blogs/opensource/stepping-up-for-a-truly-open-source-elasticsearch/</a></p></li><li><p><a href="https://logz.io/blog/open-source-elasticsearch-doubling-down/">https://logz.io/blog/open-source-elasticsearch-doubling-down/</a></p></li><li><p><a href="https://mjg59.dreamwidth.org/51230.html">https://mjg59.dreamwidth.org/51230.html</a></p></li></ul><h2>2021-04-18 Update</h2><p>AWS announced they will be actively developing OpenSearch and OpenSearch Dashboard to replace Elasticsearch and Kibana, respectively. Both these new products will be fully opensource under the Apache 2.0 License.<br>Source: <a href="https://aws.amazon.com/blogs/opensource/introducing-opensearch/">https://aws.amazon.com/blogs/opensource/introducing-opensearch/</a></p><h3>&#129505;Donation</h3><p>If you like my blog and my posts, please consider donating! Imagine this: each minute of reading a post takes about 1-2 hours to create!</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://buymeacoffee.com/tristandostaler&quot;,&quot;text&quot;:&quot;Donate &#129505;&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://buymeacoffee.com/tristandostaler"><span>Donate &#129505;</span></a></p>]]></content:encoded></item><item><title><![CDATA[CIS controls — where to start in securing a medium/big enterprise]]></title><description><![CDATA[CIS controls &#8212; where to start in securing a medium/big enterprise]]></description><link>https://www.tristandostaler.com/p/cis-controls-where-to-start-in-securing</link><guid isPermaLink="false">https://www.tristandostaler.com/p/cis-controls-where-to-start-in-securing</guid><dc:creator><![CDATA[Tristan Dostaler]]></dc:creator><pubDate>Fri, 15 Nov 2024 17:53:00 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/39b07c24-e486-433f-8119-1c25306dec09_1280x720.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>CIS controls&#8202;&#8212;&#8202;where to start in securing a medium/big enterprise</h3><p>In this post I&#8217;ll explain the CIS controls and how they can be used to start securing an enterprise.</p><p>When you&#8217;re in a medium or big environment and the maturity level of the InfoSec is around zer0, it&#8217;s hard to decide where to start in securing your environment. Do we need to update the sys&#8230;</p>
      <p>
          <a href="https://www.tristandostaler.com/p/cis-controls-where-to-start-in-securing">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Your server is secure? Really?]]></title><description><![CDATA[What to do after you&#8217;ve secured your servers and computers]]></description><link>https://www.tristandostaler.com/p/your-server-is-secure-really</link><guid isPermaLink="false">https://www.tristandostaler.com/p/your-server-is-secure-really</guid><dc:creator><![CDATA[Tristan Dostaler]]></dc:creator><pubDate>Fri, 15 Nov 2024 17:10:59 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!iZsy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F903d05e2-db91-4b28-a302-7967c9765a1e_426x426.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>What to do after you&#8217;ve secured your servers and computers</h1><p>You&#8217;ve hardened all you could on your servers or computers, you have a strong password with&nbsp;<a href="https://en.wikipedia.org/wiki/Multi-factor_authentication">MFA</a>, you update regularly or automatically everything and are wondering what can be done next?</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iZsy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F903d05e2-db91-4b28-a302-7967c9765a1e_426x426.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iZsy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F903d05e2-db91-4b28-a302-7967c9765a1e_426x426.jpeg 424w, https://substackcdn.com/image/fetch/$s_!iZsy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F903d05e2-db91-4b28-a302-7967c9765a1e_426x426.jpeg 848w, https://substackcdn.com/image/fetch/$s_!iZsy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F903d05e2-db91-4b28-a302-7967c9765a1e_426x426.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!iZsy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F903d05e2-db91-4b28-a302-7967c9765a1e_426x426.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iZsy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F903d05e2-db91-4b28-a302-7967c9765a1e_426x426.jpeg" width="426" height="426" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/903d05e2-db91-4b28-a302-7967c9765a1e_426x426.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:426,&quot;width&quot;:426,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Image for post&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Image for post" title="Image for post" srcset="https://substackcdn.com/image/fetch/$s_!iZsy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F903d05e2-db91-4b28-a302-7967c9765a1e_426x426.jpeg 424w, https://substackcdn.com/image/fetch/$s_!iZsy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F903d05e2-db91-4b28-a302-7967c9765a1e_426x426.jpeg 848w, https://substackcdn.com/image/fetch/$s_!iZsy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F903d05e2-db91-4b28-a302-7967c9765a1e_426x426.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!iZsy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F903d05e2-db91-4b28-a302-7967c9765a1e_426x426.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Like you probably know, you can never be 100% protected and there is always a way criminals can find to access private information. For those who tells me they are 100% secure, here is an example:</p><p>You have a secure WordPress website at www.mysite.com which has nice plugins to secure it, you maintain it up to date and you have&nbsp;<a href="https://en.wikipedia.org/wiki/Multi-factor_authentication">MFA</a>. You then go in a public cafe to make some changes to your website. You enter your WordPress URL in your browser, get the login window, enter your password + your&nbsp;<a href="https://en.wikipedia.org/wiki/Multi-factor_authentication">MFA&nbsp;</a>and get access to your website. You then make some changes and everything works as normal. Then a few days later your site gets defaced, or worse. What happened?</p><p>What you missed here is that an attacker in the same cafe as you was able to change the IP returned when you did a&nbsp;<a href="https://en.wikipedia.org/wiki/Domain_Name_System">DNS</a>&nbsp;query for your domain (either through&nbsp;<a href="https://en.wikipedia.org/wiki/Man-in-the-middle_attack">MITM&nbsp;</a>or by changing the&nbsp;<a href="https://en.wikipedia.org/wiki/Domain_Name_System">DNS&nbsp;</a>Server in the router config). He then redirected you to a new domain: www.rnysite.com. This new domain is owned by the attacker and directs you to a sever that runs&nbsp;<a href="https://github.com/drk1wi/Modlishka">Modlishka</a>. This attacking tool essentially&nbsp;<a href="https://en.wikipedia.org/wiki/Proxy_server">proxies&nbsp;</a>all your traffic to your real website www.mysite.com, even validating your password +&nbsp;<a href="https://en.wikipedia.org/wiki/Multi-factor_authentication">MFA&nbsp;</a>and making the changes you ask for, but he also makes a copy of all the traffic, taking your&nbsp;<a href="https://en.wikipedia.org/wiki/HTTP_cookie">cookies</a>&nbsp;and password. Although he doesn&#8217;t have your&nbsp;<a href="https://en.wikipedia.org/wiki/Multi-factor_authentication">MFA</a>, he now has your&nbsp;<a href="https://en.wikipedia.org/wiki/HTTP_cookie">cookies</a>. Oh and if that&#8217;s not enough,<a href="https://www.unix-ninja.com/p/attacking_google_authenticator">&nbsp;it&#8217;s possible now to brute-force the TOTP seed with Hashcat with only 2 TOTP token</a>. (<a href="https://en.wikipedia.org/wiki/Brute-force_attack">Here is a definition of Brute-force attack</a>)</p><p>So now what?</p><p>Well, here comes logging, aggregating, correlating and alerting &#8212; also known as a&nbsp;<a href="https://en.wikipedia.org/wiki/Security_information_and_event_management">Security Information and Event Management</a>, or SIEM.</p><p>But what is a SIEM? As Varonis puts it:</p><blockquote><p>Security Information and Event Management (SIEM) is a software solution that aggregates and analyzes activity from many different resources across your entire IT infrastructure.</p><p>SIEM collects security data from network devices, servers, domain controllers, and more. SIEM stores, normalizes, aggregates, and applies analytics to that data to discover trends, detect threats, and enable organizations to investigate any alerts.</p><p><em>Source:&nbsp;<a href="https://www.varonis.com/blog/what-is-siem/">https://www.varonis.com/blog/what-is-siem/</a></em></p></blockquote><p>&#8230;</p><p>Now that we established what is a SIEM and why it is needed, how to we get started with this?</p><p>Well, to get started using a SIEM, you can read my blog posts on the subject! My goal is to make it easy to understand and accessible to anyone with some IT experience.</p><p>Next post:&nbsp;<a href="https://www.tristandostaler.com/siem-101-introduction/">SIEM 101 &#8212; Introduction</a></p><p>Feel free to leave your comment down here for any questions or comments.</p><h3><strong>Donation</strong></h3><p>If you like my blog and my posts, please consider donating! Imagine this: each minute of reading a post takes about 1-2 hours to create!</p>]]></content:encoded></item><item><title><![CDATA[SIEM 101 — Introduction]]></title><description><![CDATA[In the following days, I&#8217;ll write a few blog posts explaining how to easily learn to use a Security Information and Event Management, or SIEM.]]></description><link>https://www.tristandostaler.com/p/siem-101-introduction</link><guid isPermaLink="false">https://www.tristandostaler.com/p/siem-101-introduction</guid><dc:creator><![CDATA[Tristan Dostaler]]></dc:creator><pubDate>Fri, 15 Nov 2024 17:01:02 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Pgmv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79f5076e-3f72-4647-a2e6-4539dd7c0a20_1920x842.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Pgmv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79f5076e-3f72-4647-a2e6-4539dd7c0a20_1920x842.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Pgmv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79f5076e-3f72-4647-a2e6-4539dd7c0a20_1920x842.webp 424w, https://substackcdn.com/image/fetch/$s_!Pgmv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79f5076e-3f72-4647-a2e6-4539dd7c0a20_1920x842.webp 848w, https://substackcdn.com/image/fetch/$s_!Pgmv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79f5076e-3f72-4647-a2e6-4539dd7c0a20_1920x842.webp 1272w, https://substackcdn.com/image/fetch/$s_!Pgmv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79f5076e-3f72-4647-a2e6-4539dd7c0a20_1920x842.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Pgmv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79f5076e-3f72-4647-a2e6-4539dd7c0a20_1920x842.webp" width="1456" height="639" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/79f5076e-3f72-4647-a2e6-4539dd7c0a20_1920x842.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:639,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:52346,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Pgmv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79f5076e-3f72-4647-a2e6-4539dd7c0a20_1920x842.webp 424w, https://substackcdn.com/image/fetch/$s_!Pgmv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79f5076e-3f72-4647-a2e6-4539dd7c0a20_1920x842.webp 848w, https://substackcdn.com/image/fetch/$s_!Pgmv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79f5076e-3f72-4647-a2e6-4539dd7c0a20_1920x842.webp 1272w, https://substackcdn.com/image/fetch/$s_!Pgmv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79f5076e-3f72-4647-a2e6-4539dd7c0a20_1920x842.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In the following days, I&#8217;ll write a few blog posts explaining how to easily learn to use a&nbsp;<a href="https://en.wikipedia.org/wiki/Security_information_and_event_management">Security Information and Event Management</a>, or SIEM.</p><p><em>Note: In this post I use Logz.io for my examples, but I recently switched to Humio. For more details: <a href="https://www.tristandostaler.com/why-i-switched-from-logz-io-to-humio/">https://www.tristandostaler.com/why-i-switched-from-logz-io-to-humio/</a></em></p><p>But what is a SIEM? As Varonis puts it:</p><blockquote><p><em>Security Information and Event Management (SIEM) is a software solution that aggregates and analyzes activity from many different resources across your entire IT infrastructure.</em></p><p><em>SIEM collects security data from network devices, servers, domain controllers, and more. SIEM stores, normalizes, aggregates, and applies analytics to that data to discover trends, detect threats, and enable organizations to investigate any alerts.</em></p><p>Source:&nbsp;<a href="https://www.varonis.com/blog/what-is-siem/">https://www.varonis.com/blog/what-is-siem/</a></p></blockquote><p>To do this, I wrote the post&nbsp;<a href="https://www.tristandostaler.com/siem-101-initial-setup/">SIEM 101 &#8212; Initial setup</a>&nbsp;where I explain how to create an account on&nbsp;<a href="https://logz.io/">Logz.io</a>; they offer a free account where you can send up to 1 GB / day of logs to try their platform. Time needed: around 2 minutes.</p><p>Still in the post&nbsp;<a href="https://www.tristandostaler.com/siem-101-initial-setup/">SIEM 101 &#8212; Initial setup</a>, I then explain how to send your logs there, whether you&#8217;re on Windows or on Linux. Time needed: around 5&#8211;10 minutes.</p><p>After&nbsp;that, I&#8217;ll explain the basic usage of&nbsp;<a href="https://logz.io/">Logz.io</a>, how to search logs, how to create an alarm, etc. Time needed: around 30 minutes.</p><p>When all this is done, the scene will be in place to start writing blogs on detection cases, for example: receive an alert if Windows is brute forced, receive an alert if a failed logon happened on your WordPress server, etc.</p><p>I&#8217;ll eventually talk about the scripts I developed that uses&nbsp;<a href="https://logz.io/">Logz.io</a>&nbsp;to automatically block bad IPs on my servers.</p><p>For the most advanced users, you&#8217;ll then be able to discover some useful tools the community provides, like the&nbsp;<a href="https://github.com/Neo23x0/sigma">Sigma rules</a>.</p><p>Follow me in my next post:&nbsp;<a href="https://www.tristandostaler.com/siem-101-initial-setup/">SIEM 101 &#8212; Initial setup</a></p><p>Feel free to leave your comment down here for any questions or comments.</p><h3><strong>Donation</strong></h3><p>If you like my blog and my posts, please consider donating! Imagine this: each minute of reading a post takes about 1-2 hours to create!</p>]]></content:encoded></item><item><title><![CDATA[Never receive an alert from Windows Defender? You should!]]></title><description><![CDATA[A few years ago, I was on the defense team when a pentest was ongoing on one of our website.]]></description><link>https://www.tristandostaler.com/p/never-receive-an-alert-from-windows</link><guid isPermaLink="false">https://www.tristandostaler.com/p/never-receive-an-alert-from-windows</guid><dc:creator><![CDATA[Tristan Dostaler]]></dc:creator><pubDate>Thu, 14 Nov 2024 20:44:19 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!BNP_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4e19437-44d6-4219-a2d6-35bc8ae0f680_500x365.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BNP_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4e19437-44d6-4219-a2d6-35bc8ae0f680_500x365.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BNP_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4e19437-44d6-4219-a2d6-35bc8ae0f680_500x365.jpeg 424w, https://substackcdn.com/image/fetch/$s_!BNP_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4e19437-44d6-4219-a2d6-35bc8ae0f680_500x365.jpeg 848w, https://substackcdn.com/image/fetch/$s_!BNP_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4e19437-44d6-4219-a2d6-35bc8ae0f680_500x365.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!BNP_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4e19437-44d6-4219-a2d6-35bc8ae0f680_500x365.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BNP_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4e19437-44d6-4219-a2d6-35bc8ae0f680_500x365.jpeg" width="500" height="365" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b4e19437-44d6-4219-a2d6-35bc8ae0f680_500x365.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:365,&quot;width&quot;:500,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!BNP_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4e19437-44d6-4219-a2d6-35bc8ae0f680_500x365.jpeg 424w, https://substackcdn.com/image/fetch/$s_!BNP_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4e19437-44d6-4219-a2d6-35bc8ae0f680_500x365.jpeg 848w, https://substackcdn.com/image/fetch/$s_!BNP_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4e19437-44d6-4219-a2d6-35bc8ae0f680_500x365.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!BNP_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4e19437-44d6-4219-a2d6-35bc8ae0f680_500x365.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Sometime the reds&nbsp;win&#8230;</figcaption></figure></div><p>A few years ago, I was on the defense team when a pentest was ongoing on one of our website. This website, coded in C#, was hosted on Windows and had Windows Defender activated.</p><p>During the pentest, the attacker had access to the CMS. He discovered that he could upload his own plugins, giving him Remote Code Execution (RCE) on the server. Happy with this discovery, he started his C&amp;C server (it was PowerShell Empire 2 at the time), crafted a payload and launched the result in a C# wrapped plugin and then&#8230; nothing.</p><p>As some of you may know, C#, PowerShell and Defender all love to work together. That&#8217;s because the&nbsp;.NET framework is now tightly integrated with Windows Defender. When sending the payload, Defender could see and block the attack.</p><p>So all the attacker had to do was to modify his payload until it passed all the checks Defender does. After a few hours, he had a complete reverse shell (although restricted to the IIS user).</p><p>From the defense point of view, the fact that Defender did his job is perfect. But the fact that we didn&#8217;t know Defender blocked a file-less attack and we only learned it when we receive the report should be considered a disaster. It means your AV is useless because an attacker has all the time he needs to craft his attack.</p><p>From this point, the next steps where clear, we needed to receive an alert when a virus was detected. And maybe on other suspicious behavior? That&#8217;s when I discovered what is a SIEM!</p><p>If you wan&#8217;t to know more about what is a SIEM and how to use it, you can read my blog posts on the subject starting with:&nbsp;<a href="https://www.tristandostaler.com/siem-101-introduction/">SIEM 101&#8202;&#8212;&#8202;Introduction</a></p><p>Feel free to leave your comment down here for any questions or comments.</p><h3><strong>Donation</strong></h3><p>If you like my blog and my posts, please consider donating! Imagine this: each minute of reading a post takes about 1-2 hours to create!</p>]]></content:encoded></item><item><title><![CDATA[SIEM 101 — Initial setup]]></title><description><![CDATA[In this post, I&#8217;ll explain how to initially setup a SIEM so you can receive your first logs.]]></description><link>https://www.tristandostaler.com/p/siem-101-initial-setup</link><guid isPermaLink="false">https://www.tristandostaler.com/p/siem-101-initial-setup</guid><dc:creator><![CDATA[Tristan Dostaler]]></dc:creator><pubDate>Thu, 14 Nov 2024 15:28:03 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!9KFL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1feada15-be8d-44fb-8752-3d4bc5259943_492x387.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In this post, I&#8217;ll explain how to initially setup a SIEM so you can receive your first logs.</p><p><em>Note: In this post I use Logz.io for my examples, but I recently switched to Humio. For more details: <a href="https://www.tristandostaler.com/why-i-switched-from-logz-io-to-humio/">https://www.tristandostaler.com/why-i-switched-from-logz-io-to-humio/</a></em></p><div><hr></div><p>This is the second post of the series &#8220;SIEM 101&#8243; where I explain the basics of a SIEM, from installation to simple usage. You can see the previous post&nbsp;<a href="https://www.tristandostaler.com/siem-101-introduction/">SIEM 101&#8202;&#8212;&#8202;Introduction</a>.</p><div><hr></div><p>I decided to write the series using&nbsp;<a href="https://logz.io/">Logz.io</a>&nbsp;because they offer an easy to use platform with a free 1GB/day trial with a smooth learning curve. Of course they don&#8217;t offer all the features in the free version and some crucial features for a SIEM are missing, but this is perfect to get started with a SIEM! For the&nbsp;<a href="https://www.splunk.com/">Splunk</a>&nbsp;fans, I&#8217;ll probably write a blog post about why I don&#8217;t recommend it often and why I recommend an&nbsp;<a href="https://www.elastic.co/what-is/elasticsearch">Elasticsearch</a>&nbsp;based SIEM most of the time.</p>
      <p>
          <a href="https://www.tristandostaler.com/p/siem-101-initial-setup">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[SIEM 202 — Detecting remote PsExec]]></title><description><![CDATA[In this post I&#8217;ll explain how to detect an attacker that uses PsExec to connect to your computer when you don&#8217;t have visibility over the attacker&#8217;s computer.]]></description><link>https://www.tristandostaler.com/p/siem-202-detecting-remote-psexec</link><guid isPermaLink="false">https://www.tristandostaler.com/p/siem-202-detecting-remote-psexec</guid><dc:creator><![CDATA[Tristan Dostaler]]></dc:creator><pubDate>Thu, 14 Nov 2024 13:57:12 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ssF3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3c682f8-e683-4f65-963e-c1a7e7a13082_1901x866.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In this post I&#8217;ll explain how to detect an attacker that uses PsExec to connect to your computer when you don&#8217;t have visibility over the attacker&#8217;s computer.</p><p><em>Note: In this post I use Logz.io for my examples, but I recently switched to Humio. For more details: <a href="https://www.tristandostaler.com/why-i-switched-from-logz-io-to-humio/">https://www.tristandostaler.com/why-i-switched-from-logz-io-to-humio/</a></em></p><div><hr></div><p>For this post, I assume you&#8217;ve read my&nbsp;<a href="https://www.tristandostaler.com/category/information-technology/infosec/siem/siem-100-series/">SIEM 100 series</a>&nbsp;where I explain the basics of Logz.io. I&#8217;ll be using the stack I created in this series to demonstrate what to do.</p><div><hr></div><p>PsExec is a tool provided by Microsoft in the Sysinternals suite:&nbsp;<a href="https://docs.microsoft.com/en-us/sysinternals/downloads/psexec">https://docs.microsoft.com/en-us/sysinternals/downloads/psexec</a><br>Like they explain:<br>&nbsp;</p><blockquote><p>PsExec is a light-weight telnet-replacement that lets you execute processes on other systems, complete with full interactivity for console applications, without having to manually install client software. PsExec&#8217;s most powerful uses include launching interactive command-prompts on remote systems and remote-enabling tools like IpConfig that otherwise do not have the ability to show information about remote systems.</p><p><a href="https://docs.microsoft.com/en-us/sysinternals/downloads/psexec">https://docs.microsoft.com/en-us/sysinternals/downloads/psexec</a></p></blockquote><p>PsExec can be use as an adversary to pivot between computers and/or elevate privileges. It is rather easy to detect when executed on a monitored endpoint, but what happens when a remote computer not monitored use it to connect to a monitored endpoint?</p><p>It turns out it can be detected by looking for a chain of 3 events, distinctive of PsExec behavior when remote connecting.</p>
      <p>
          <a href="https://www.tristandostaler.com/p/siem-202-detecting-remote-psexec">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[SIEM 102 — Detect Windows bruteforce]]></title><description><![CDATA[In this post I&#8217;ll explain how to detect a bruteforce on Windows.]]></description><link>https://www.tristandostaler.com/p/siem-102-detect-windows-bruteforce</link><guid isPermaLink="false">https://www.tristandostaler.com/p/siem-102-detect-windows-bruteforce</guid><dc:creator><![CDATA[Tristan Dostaler]]></dc:creator><pubDate>Wed, 13 Nov 2024 15:17:28 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!X86C!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5514351d-d519-4be3-867f-46c172d59229_1281x705.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In this post I&#8217;ll explain how to detect a bruteforce on Windows. This is a simple case so it&#8217;s a good use case to start learning to create alerts.</p><p><em>Note: In this post I use Logz.io for my examples, but I recently switched to Humio. For more details: <a href="https://www.tristandostaler.com/why-i-switched-from-logz-io-to-humio/">https://www.tristandostaler.com/why-i-switched-from-logz-io-to-humio/</a></em></p><div><hr></div><p>For this post, I assume you&#8217;ve read my&nbsp;<a href="https://www.tristandostaler.com/category/information-technology/infosec/siem/siem-100-series/">SIEM 100 series</a>&nbsp;where I explain the basics of Logz.io. I&#8217;ll be using the stack I created in this series to demonstrate what to do.</p><div><hr></div><h3>Why we need to detect Windows bruteforce</h3><p>When we have a lot of Windows machine in our environment, it can be useful to be able to detect a bruteforce on a machine, be it over <a href="https://en.wikipedia.org/wiki/Remote_Desktop_Protocol">RDP</a> or not. For example, with this Use Case, we could detect an attacker trying to login on a sensitive computer or trying to pivot between machine.</p><p>This Use Case is really simple so it&#8217;s rather easy to develop and test. But it&#8217;s also prone to false positive, so it&#8217;s a good Use Case to learn to reduce the false positives.</p><h3>How</h3>
      <p>
          <a href="https://www.tristandostaler.com/p/siem-102-detect-windows-bruteforce">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[SIEM 201 — What is Sysmon]]></title><description><![CDATA[In this post I&#8217;ll explain what is Sysmon, how to install it and how to use it to detect important pattern.]]></description><link>https://www.tristandostaler.com/p/siem-201-what-is-sysmon</link><guid isPermaLink="false">https://www.tristandostaler.com/p/siem-201-what-is-sysmon</guid><dc:creator><![CDATA[Tristan Dostaler]]></dc:creator><pubDate>Wed, 13 Nov 2024 14:41:58 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!LQlj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c9c15dc-3756-4eb9-8ec6-06a417a7d464_1423x907.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In this post I&#8217;ll explain what is Sysmon, how to install it and how to use it to detect important pattern.</p><p><em>Note: In this post I use Logz.io for my examples, but I recently switched to Humio. For more details: <a href="https://www.tristandostaler.com/why-i-switched-from-logz-io-to-humio/">https://www.tristandostaler.com/why-i-switched-from-logz-io-to-humio/</a></em></p><div><hr></div><p>For this post, I assume you&#8217;ve read my&nbsp;<a href="https://www.tristandostaler.com/category/information-technology/infosec/siem/siem-100-series/">SIEM 100 series</a>&nbsp;where I explain the basics of Logz.io. I&#8217;ll be using the stack I created in this series to demonstate what to do.</p><div><hr></div><p>Sysmon is a tool provided by Microsoft in the Sysinternals suite:&nbsp;<a href="https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon">https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon.&nbsp;</a>&nbsp;</p><p>Like they explain:</p><blockquote><p><em>System Monitor</em>&nbsp;(<em>Sysmon</em>) is a Windows system service and device driver that, once installed on a system, remains resident across system reboots to monitor and log system activity to the Windows event log. It provides detailed information about process creations, network connections, and changes to file creation time. By collecting the events it generates using&nbsp;<a href="https://msdn.microsoft.com/library/windows/desktop/bb427443(v=vs.85).aspx">Windows Event Collection</a>&nbsp;or&nbsp;<a href="https://en.wikipedia.org/wiki/security_information_and_event_management">SIEM</a>&nbsp;agents and subsequently analyzing them, you can identify malicious or anomalous activity and understand how intruders and malware operate on your network.</p></blockquote>
      <p>
          <a href="https://www.tristandostaler.com/p/siem-201-what-is-sysmon">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[SIEM Solutions 101 — Basic usage]]></title><description><![CDATA[In this post I&#8217;ll explain the basics on using a SIEM: how to search logs and how to send alerts.]]></description><link>https://www.tristandostaler.com/p/siem-101-basic-usage</link><guid isPermaLink="false">https://www.tristandostaler.com/p/siem-101-basic-usage</guid><dc:creator><![CDATA[Tristan Dostaler]]></dc:creator><pubDate>Wed, 13 Nov 2024 13:24:07 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/06aad0b0-28cb-46b1-8798-8114f746cc84_1488x863.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In this post I&#8217;ll explain the basics on using a SIEM: how to search logs and how to send alerts.</p><p><em>Note: In this post I use Logz.io for my examples, but I recently switched to Humio. For more details: <a href="https://www.tristandostaler.com/why-i-switched-from-logz-io-to-humio/">https://www.tristandostaler.com/why-i-switched-from-logz-io-to-humio/</a></em></p><div><hr></div><p>This is the third post of the series &#8220;SIEM 101&#8221; where I explain the basics of a SIEM, from installation to simple usage. You can see the previous post&nbsp;<a href="https://www.tristandostaler.com/siem-101-initial-setup/">SIEM 101&#8202;&#8212;&#8202;Initial setup</a>.</p><div><hr></div>
      <p>
          <a href="https://www.tristandostaler.com/p/siem-101-basic-usage">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Information Security synonyms]]></title><description><![CDATA[Information Security, Cybersecurity, IT security, and other synonyms]]></description><link>https://www.tristandostaler.com/p/information-security-synonyms</link><guid isPermaLink="false">https://www.tristandostaler.com/p/information-security-synonyms</guid><dc:creator><![CDATA[Tristan Dostaler]]></dc:creator><pubDate>Wed, 13 Nov 2024 13:08:08 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Zuf4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb64d6b3-a09e-4f32-b1ac-c3cfa3bc67eb_524x382.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Information Security, Cybersecurity, IT security, and other synonyms</h2><p>Information Security, Cybersecurity, IT security. We&#8217;ve all heard and read them in interchangeable ways, these synonyms all aim to define what is security. But most of them imply assumptions harmful for the Information Security domain. Let me explain.</p><h3>What we try to do</h3><p>Generally, when we, or often the media, use the term &#8220;Cybersecurity&#8221;, we want to describe the idea that we want to be secure against some kind of &#8220;hacker&#8221;. Most people who use this term imagine a &#8220;hacker&#8221;, in a black hoodie, in front of a screen full of green scribble. But this idea misses the point of what really is Security, or as I prefer to say, Information Security, or InfoSec.</p><p>What a bad actor, often named &#8220;hacker&#8221;, really want to do is to gain access to information that he/she wouldn&#8217;t normally have access otherwise to reach a goal.</p><p>In a ransomware attack, the goal is to keep you from having access to this information and extort money from you. In a phishing attack, the goal could be to steal credentials, which is a kind of information, to use them or sell them.</p><p>So once we understand what the bad actor wants, we understand what we need to protect. At the highest level, the goal is Information. Hence the word &#8220;information&#8221; in &#8220;Information Security&#8221;. The security part imply the idea that we want to protect this information against all kind of attacks.</p><h3>Why it&#8217;s a problem</h3><p>The problem with the words &#8220;Cybersecurity&#8221;, &#8220;IT security&#8221; and other similar terms is that they imply that the security must be done at the technology level: the computers, the servers, the firewalls, the switches, etc. While it is important to secure these technologies, the global strategy needs to be way larger.</p><p>For example, no technology can help us against the CEO fraud if an untrain employee falls for it. The problem in this specific case is the lack of training. Training is not a technological solution but it is one of the most effective strategy to protect the business.</p><p>If we try to reduce the security problem to only the technology, we&#8217;ll fail miserably.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Zuf4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb64d6b3-a09e-4f32-b1ac-c3cfa3bc67eb_524x382.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Zuf4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb64d6b3-a09e-4f32-b1ac-c3cfa3bc67eb_524x382.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Zuf4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb64d6b3-a09e-4f32-b1ac-c3cfa3bc67eb_524x382.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Zuf4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb64d6b3-a09e-4f32-b1ac-c3cfa3bc67eb_524x382.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Zuf4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb64d6b3-a09e-4f32-b1ac-c3cfa3bc67eb_524x382.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Zuf4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb64d6b3-a09e-4f32-b1ac-c3cfa3bc67eb_524x382.jpeg" width="524" height="382" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fb64d6b3-a09e-4f32-b1ac-c3cfa3bc67eb_524x382.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:382,&quot;width&quot;:524,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Data security vs. the people (in a ring). Cybersecurity vs the people (in a ring).&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Data security vs. the people (in a ring). Cybersecurity vs the people (in a ring)." title="Data security vs. the people (in a ring). Cybersecurity vs the people (in a ring)." srcset="https://substackcdn.com/image/fetch/$s_!Zuf4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb64d6b3-a09e-4f32-b1ac-c3cfa3bc67eb_524x382.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Zuf4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb64d6b3-a09e-4f32-b1ac-c3cfa3bc67eb_524x382.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Zuf4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb64d6b3-a09e-4f32-b1ac-c3cfa3bc67eb_524x382.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Zuf4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb64d6b3-a09e-4f32-b1ac-c3cfa3bc67eb_524x382.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Data security vs. The people</figcaption></figure></div><p>The reason these terms are harmful to the domain is that they create this idea in the mind of the leaders that security is an IT problem. So it often falls in the hands of an IT officer, like the CTO. Most businesses don&#8217;t have a CISO, and those who do have him/her under the IT department. I could write a complete post on why this is a bad idea.</p><h3>What should we do</h3><p>This is a business culture problem and this is where we need to start the work. Businesses that invest in a Security culture often thrives even more than the ones that put millions on technologies.</p><p>So it is more than time that we start talking about this domain by naming it &#8220;Information Security&#8220;!</p><p><em>Note: I wrote &#8220;hacker&#8221; between quotes when talking about bad actors because this term became pejorative. Initially, a hacker is only someone who finds a way around some limitations, with good or bad intentions; mostly goods. For example, my reading light is too bright and I can&#8217;t dim it enough; so I put black tape on it to cover about 80% so I get just enough light. That&#8217;s hacking applied to something else than technology. It&#8217;s a ridiculous example to demonstrate my idea.</em></p><p><em>As explained in wikipedia:</em></p><blockquote><p>The controversy is usually based on the assertion that the term originally meant someone messing about with something in a positive sense, that is, using playful cleverness to achieve a goal. But then, it is supposed, the meaning of the term shifted over the decades and came to refer to computer criminals</p><p>Source: <a href="https://en.wikipedia.org/wiki/Hacker">https://en.wikipedia.org/wiki/Hacker</a></p></blockquote><p><em>Note 2: because of the way SEO works, I&#8217;ll hack my way to the top results by placing terms like &#8220;Cybersecurity&#8221; in my blog from time to time &#128521;</em></p><p>Feel free to leave your comment down here for any questions or comments.</p><h3>Donation</h3><p>If you like my blog and my posts, please consider <a href="https://www.paypal.com/paypalme/tristandostaler">donating</a>! Imagine this: each minute of reading a post takes about 1-2 hours to create!</p>]]></content:encoded></item><item><title><![CDATA[Why the SolarWinds hack matters]]></title><description><![CDATA[Maybe you saw the news on the SolarWinds hack.]]></description><link>https://www.tristandostaler.com/p/why-the-solarwinds-hack-matters</link><guid isPermaLink="false">https://www.tristandostaler.com/p/why-the-solarwinds-hack-matters</guid><dc:creator><![CDATA[Tristan Dostaler]]></dc:creator><pubDate>Tue, 12 Nov 2024 16:21:07 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/2fc092e8-2fcc-4afb-b61f-6f2594f47ff1_770x154.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Maybe you saw the news on the SolarWinds hack. If you didn&#8217;t, you should follow me on Twitter: <a href="https://twitter.com/TristanDostaler">https://twitter.com/TristanDostaler</a><br><br>In this post I want to explain, in a way understandable by everyone, why this hack matters.</p><h2>What is SolarWinds Orion</h2><p><a href="https://www.solarwinds.com/">SolarWinds</a> is a US based company. They have clients worldwide. One of the products they offer is <a href="https://www.solarwinds.com/fr/solutions/orion">Orion</a>. This tool does a lot of things, but the main feature that interest us is that it provides the ability to monitor your infrastructure. To do this, you need to install the Orion agent on one of your servers. This agent is installed with high privileges and is able to login on most of your infrastructure to gather metrics like CPU, RAM, etc.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Do9S!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ec69a59-365f-437c-a7f0-ddb3db6c5495_770x154.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Do9S!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ec69a59-365f-437c-a7f0-ddb3db6c5495_770x154.png 424w, https://substackcdn.com/image/fetch/$s_!Do9S!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ec69a59-365f-437c-a7f0-ddb3db6c5495_770x154.png 848w, https://substackcdn.com/image/fetch/$s_!Do9S!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ec69a59-365f-437c-a7f0-ddb3db6c5495_770x154.png 1272w, https://substackcdn.com/image/fetch/$s_!Do9S!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ec69a59-365f-437c-a7f0-ddb3db6c5495_770x154.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Do9S!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ec69a59-365f-437c-a7f0-ddb3db6c5495_770x154.png" width="770" height="154" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2ec69a59-365f-437c-a7f0-ddb3db6c5495_770x154.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:154,&quot;width&quot;:770,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Solarwinds &#8211; ITWay Hellas S.A.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Solarwinds &#8211; ITWay Hellas S.A." title="Solarwinds &#8211; ITWay Hellas S.A." srcset="https://substackcdn.com/image/fetch/$s_!Do9S!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ec69a59-365f-437c-a7f0-ddb3db6c5495_770x154.png 424w, https://substackcdn.com/image/fetch/$s_!Do9S!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ec69a59-365f-437c-a7f0-ddb3db6c5495_770x154.png 848w, https://substackcdn.com/image/fetch/$s_!Do9S!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ec69a59-365f-437c-a7f0-ddb3db6c5495_770x154.png 1272w, https://substackcdn.com/image/fetch/$s_!Do9S!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ec69a59-365f-437c-a7f0-ddb3db6c5495_770x154.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><h2>What&#8217;s the hack</h2><p>At the moment I am writing these lines, it is unclear how SolarWinds got hacked. What we know is that it was perpetrated by an APT (<a href="https://en.wikipedia.org/wiki/Advanced_persistent_threat">Advanced Persistent Threat</a>, a term used to describe high profile malicious hacker groups) probably backed by Russia. In other words, <strong>they got hacked by a highly skilled group of hackers with deep pockets</strong>.</p>
      <p>
          <a href="https://www.tristandostaler.com/p/why-the-solarwinds-hack-matters">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Zero Trust Architecture – What it is and what I think of it]]></title><description><![CDATA[I have been reading the Zero Trust Architecture (ZTA) publication from the NIST for quite some time now.]]></description><link>https://www.tristandostaler.com/p/zero-trust-architecture-what-it-is</link><guid isPermaLink="false">https://www.tristandostaler.com/p/zero-trust-architecture-what-it-is</guid><dc:creator><![CDATA[Tristan Dostaler]]></dc:creator><pubDate>Tue, 12 Nov 2024 16:11:13 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ydd8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2c0c7e06-0274-44af-a5b9-32c666bd5aa0_1024x414.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I have been reading the Zero Trust Architecture (ZTA) publication from the NIST for quite some time now. You can find the document here: <a href="https://csrc.nist.gov/publications/detail/sp/800-207/final">https://csrc.nist.gov/publications/detail/sp/800-207/final</a>. This 41 page document is dense and full of advanced architecture patterns. It took me a while to read and understand.</p><h2><br>What is a Zero Trust Architecture</h2><p>A Zero Trust Architecture (ZTA) is an Information Security architecture based on the idea that a network shouldn&#8217;t have inherent trust on the internal boundary. Many enterprise networks are designed like an egg where they have a rather strong and robust external shell, but once inside the shell, everything is lax; it needs only a little needle that is able to break through the shell to wreak havoc inside.</p>
      <p>
          <a href="https://www.tristandostaler.com/p/zero-trust-architecture-what-it-is">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[SIEM 102 — Detect WordPress bruteforce]]></title><description><![CDATA[Why we need to detect WordPress bruteforce attack]]></description><link>https://www.tristandostaler.com/p/siem-102-detect-wordpress-bruteforce</link><guid isPermaLink="false">https://www.tristandostaler.com/p/siem-102-detect-wordpress-bruteforce</guid><dc:creator><![CDATA[Tristan Dostaler]]></dc:creator><pubDate>Tue, 12 Nov 2024 15:52:04 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!6ZP2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b03deed-a088-4c67-9bea-c5139577e708_1024x571.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Why we need to detect WordPress bruteforce attack</h2><p>WordPress is one of the most popular CMS and website server in the world. It handles &#8220;<a href="https://techjury.net/blog/percentage-of-wordpress-websites/">more than 30%</a>&#8221; of the websites on the internet. Because of this, bad actors are really interested in finding ways to get control of them.</p><p>One of the most easy way for them to achieve this is by bruteforcing the login for common username and password combinaisons, including from past leaks. This is a working strategy because by default WordPress doesn&#8217;t protect against bruteforce attacks.</p><h2>How do we detect a WordPress bruteforce attack</h2><p>In the WordPress world, there are many ways to handle bruteforce attacks, as this is rather simple to detect. But because we are in the SIEM series, I&#8217;ll talk about how to detect the attack using a SIEM.</p>
      <p>
          <a href="https://www.tristandostaler.com/p/siem-102-detect-wordpress-bruteforce">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[An overview of a good InfoSec Strategy]]></title><description><![CDATA[A friend of mine recently challenged my post SIEM 102 &#8212; Detect WordPress bruteforce where he proposed a tool that can effectively bruteforce WordPress from a lot of different IPs:]]></description><link>https://www.tristandostaler.com/p/an-overview-of-a-good-infosec-strategy</link><guid isPermaLink="false">https://www.tristandostaler.com/p/an-overview-of-a-good-infosec-strategy</guid><dc:creator><![CDATA[Tristan Dostaler]]></dc:creator><pubDate>Tue, 12 Nov 2024 15:46:59 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!_-0Y!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F119fb6ec-dce3-482c-98c1-b88e2ab6e64b_543x312.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>A friend of mine recently challenged my post <a href="https://www.tristandostaler.com/siem-102-detect-wordpress-bruteforce/">SIEM 102 &#8212; Detect WordPress bruteforce</a> where he proposed a tool that can effectively bruteforce WordPress from a lot of different IPs:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_-0Y!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F119fb6ec-dce3-482c-98c1-b88e2ab6e64b_543x312.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_-0Y!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F119fb6ec-dce3-482c-98c1-b88e2ab6e64b_543x312.png 424w, https://substackcdn.com/image/fetch/$s_!_-0Y!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F119fb6ec-dce3-482c-98c1-b88e2ab6e64b_543x312.png 848w, https://substackcdn.com/image/fetch/$s_!_-0Y!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F119fb6ec-dce3-482c-98c1-b88e2ab6e64b_543x312.png 1272w, https://substackcdn.com/image/fetch/$s_!_-0Y!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F119fb6ec-dce3-482c-98c1-b88e2ab6e64b_543x312.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_-0Y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F119fb6ec-dce3-482c-98c1-b88e2ab6e64b_543x312.png" width="543" height="312" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/119fb6ec-dce3-482c-98c1-b88e2ab6e64b_543x312.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:312,&quot;width&quot;:543,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:32978,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_-0Y!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F119fb6ec-dce3-482c-98c1-b88e2ab6e64b_543x312.png 424w, https://substackcdn.com/image/fetch/$s_!_-0Y!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F119fb6ec-dce3-482c-98c1-b88e2ab6e64b_543x312.png 848w, https://substackcdn.com/image/fetch/$s_!_-0Y!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F119fb6ec-dce3-482c-98c1-b88e2ab6e64b_543x312.png 1272w, https://substackcdn.com/image/fetch/$s_!_-0Y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F119fb6ec-dce3-482c-98c1-b88e2ab6e64b_543x312.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Source: <a href="https://twitter.com/OffenseTeacher/status/1351927187180572673">https://twitter.com/OffenseTeacher/status/1351927187180572673</a></p><h2>Some background</h2><p>Some background are required to understand his response.</p><p>First, it is important to know that &#8230;</p>
      <p>
          <a href="https://www.tristandostaler.com/p/an-overview-of-a-good-infosec-strategy">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Where to start in Cybersecurity for new comers]]></title><description><![CDATA[Where to start in Cybersecurity &#8211; Context]]></description><link>https://www.tristandostaler.com/p/where-to-start-in-cybersecurity-for</link><guid isPermaLink="false">https://www.tristandostaler.com/p/where-to-start-in-cybersecurity-for</guid><dc:creator><![CDATA[Tristan Dostaler]]></dc:creator><pubDate>Tue, 12 Nov 2024 04:47:09 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!rJ8-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F510efeec-b037-4783-a01a-e65a90925fa7_2232x1233.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Where to start in Cybersecurity &#8211; Context</h2><p><em>Note: I used &#8220;Cybersecurity paths&#8221; , &#8220;where to start in cybersecurity&#8221; and &#8220;Cybersecurity jobs&#8221; just so I get good SEO results. To know why, you can read my post <a href="https://www.tristandostaler.com/information-security-synonyms/">Information Security Synonyms</a>.</em></p><p>If you Google &#8220;Cybersecurity paths&#8221;, &#8220;Cybersecurity career&#8221;, &#8220;Cybersecurity jobs&#8221; and other similar terms, you&#8217;ll find an &#8230;</p>
      <p>
          <a href="https://www.tristandostaler.com/p/where-to-start-in-cybersecurity-for">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Lockbit ransomware – How to recover your data]]></title><description><![CDATA[Update: Lockbit patched this bug&#8230; however, if you are hit by the version 2.0, you can still try it, it might just work!]]></description><link>https://www.tristandostaler.com/p/lockbit-ransomware-how-to-recover</link><guid isPermaLink="false">https://www.tristandostaler.com/p/lockbit-ransomware-how-to-recover</guid><dc:creator><![CDATA[Tristan Dostaler]]></dc:creator><pubDate>Tue, 12 Nov 2024 04:39:37 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Kjln!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6547a102-3ed3-414e-b0ec-f9c85df66d36_1024x479.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>Update: Lockbit patched this bug&#8230; however, if you are hit by the version 2.0, you can still try it, it might just work!</strong></p><p>Lockbit is a &#8220;<a href="https://www.upguard.com/blog/what-is-ransomware-as-a-service#:~:text=Ransomware%20as%20a%20service%20(RaaS)%20is%20a%20subscription%2Dbased,Service%20(SaaS)%20business%20model.">Ransomware as a Service</a>&#8221; which means you can buy a powerful ransomware, launch it in your target&#8217;s network and Lockbit will take care of the rest. They even have support teams to assist victims into the payment and recover&#8230;</p>
      <p>
          <a href="https://www.tristandostaler.com/p/lockbit-ransomware-how-to-recover">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Join my new subscriber chat]]></title><description><![CDATA[A private space for us to converse and connect]]></description><link>https://www.tristandostaler.com/p/join-my-new-subscriber-chat</link><guid isPermaLink="false">https://www.tristandostaler.com/p/join-my-new-subscriber-chat</guid><dc:creator><![CDATA[Tristan Dostaler]]></dc:creator><pubDate>Fri, 25 Oct 2024 02:16:53 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!KYZT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0f63c9a-2296-4c96-a2f9-52648999bb00_2000x1000.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><p>Today I&#8217;m announcing a brand new addition to my Substack publication: Tristan&#8217;s Cybersecurity Substack subscriber chat.</p><p>This is a conversation space exclusively for subscribers&#8212;kind of like a group chat or live hangout. I&#8217;ll post questions and updates that come my way, and you can jump into the discussion.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://open.substack.com/pub/tristandostaler/chat&quot;,&quot;text&quot;:&quot;Join chat&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://open.substack.com/pub/tristandostaler/chat"><span>Join chat</span></a></p><div><hr></div><h2>How to get started</h2><ol><li><p><strong>Get the Substack app by clicking <a href="https://substack.com/app/app-store-redirect">this link</a> or the button below.</strong> New chat threads won&#8217;t be sent sent via email, so turn on push notifications so you don&#8217;t miss conversation as it happens. You can also access chat <a href="https://open.substack.com/pub/tristandostaler/chat">on the web</a>.</p></li></ol><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://substack.com/app/app-store-redirect&quot;,&quot;text&quot;:&quot;Get app&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://substack.com/app/app-store-redirect"><span>Get app</span></a></p><ol start="2"><li><p><strong>Open the app and tap the Chat icon.</strong> It looks like two bubbles in the bottom bar, and you&#8217;ll see a row for my chat inside.</p></li></ol><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!KYZT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0f63c9a-2296-4c96-a2f9-52648999bb00_2000x1000.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!KYZT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0f63c9a-2296-4c96-a2f9-52648999bb00_2000x1000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!KYZT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0f63c9a-2296-4c96-a2f9-52648999bb00_2000x1000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!KYZT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0f63c9a-2296-4c96-a2f9-52648999bb00_2000x1000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!KYZT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0f63c9a-2296-4c96-a2f9-52648999bb00_2000x1000.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!KYZT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0f63c9a-2296-4c96-a2f9-52648999bb00_2000x1000.jpeg" width="1456" height="728" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e0f63c9a-2296-4c96-a2f9-52648999bb00_2000x1000.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:728,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:241528,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://kylewarrentest.substack.com/i/114198534?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0f63c9a-2296-4c96-a2f9-52648999bb00_2000x1000.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!KYZT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0f63c9a-2296-4c96-a2f9-52648999bb00_2000x1000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!KYZT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0f63c9a-2296-4c96-a2f9-52648999bb00_2000x1000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!KYZT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0f63c9a-2296-4c96-a2f9-52648999bb00_2000x1000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!KYZT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe0f63c9a-2296-4c96-a2f9-52648999bb00_2000x1000.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><ol start="3"><li><p><strong>That&#8217;s it!</strong> Jump into my thread to say hi, and if you have any issues, check out <a href="https://support.substack.com/hc/en-us/sections/360007461791-Frequently-Asked-Questions">Substack&#8217;s FAQ</a>.</p></li></ol><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.tristandostaler.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Tristan&#8217;s Cybersecurity Substack is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The Rise of Ransomware: Unveiling the Secrets Behind Their Success]]></title><description><![CDATA[In recent years, ransomware has become an increasingly prevalent and dangerous cybersecurity threat.]]></description><link>https://www.tristandostaler.com/p/the-rise-of-ransomware-unveiling-the-secrets-behind-their-success-84408be79513</link><guid isPermaLink="false">https://www.tristandostaler.com/p/the-rise-of-ransomware-unveiling-the-secrets-behind-their-success-84408be79513</guid><dc:creator><![CDATA[Tristan Dostaler]]></dc:creator><pubDate>Mon, 27 Mar 2023 23:48:55 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/a187693a-24b7-48c7-bc0a-db247f2ad0f4_1000x690.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CP6Z!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a33c4fa-00e4-4a78-9648-2ebf33d6fb93_1000x690.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CP6Z!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a33c4fa-00e4-4a78-9648-2ebf33d6fb93_1000x690.jpeg 424w, https://substackcdn.com/image/fetch/$s_!CP6Z!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a33c4fa-00e4-4a78-9648-2ebf33d6fb93_1000x690.jpeg 848w, https://substackcdn.com/image/fetch/$s_!CP6Z!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a33c4fa-00e4-4a78-9648-2ebf33d6fb93_1000x690.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!CP6Z!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a33c4fa-00e4-4a78-9648-2ebf33d6fb93_1000x690.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CP6Z!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a33c4fa-00e4-4a78-9648-2ebf33d6fb93_1000x690.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8a33c4fa-00e4-4a78-9648-2ebf33d6fb93_1000x690.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!CP6Z!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a33c4fa-00e4-4a78-9648-2ebf33d6fb93_1000x690.jpeg 424w, https://substackcdn.com/image/fetch/$s_!CP6Z!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a33c4fa-00e4-4a78-9648-2ebf33d6fb93_1000x690.jpeg 848w, https://substackcdn.com/image/fetch/$s_!CP6Z!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a33c4fa-00e4-4a78-9648-2ebf33d6fb93_1000x690.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!CP6Z!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a33c4fa-00e4-4a78-9648-2ebf33d6fb93_1000x690.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>In recent years, ransomware has become an increasingly prevalent and dangerous cybersecurity threat. These malicious attacks involve encrypting a victim&#8217;s data, rendering it inaccessible until a ransom is paid9, often in cryptocurrency. But what makes ransomware so successful, and how has it evolved into one of the most feared forms of cybercrime?</p><p>Unders&#8230;</p>
      <p>
          <a href="https://www.tristandostaler.com/p/the-rise-of-ransomware-unveiling-the-secrets-behind-their-success-84408be79513">
              Read more
          </a>
      </p>
   ]]></content:encoded></item></channel></rss>