<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	 xmlns:media="http://search.yahoo.com/mrss/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" >

<channel>
	<title>Kaushal Bhavsar</title>
	<atom:link href="https://kaushalbhavsar.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://kaushalbhavsar.com</link>
	<description>Diary of a Tech Geek</description>
	<lastBuildDate>Thu, 07 Sep 2023 01:39:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.2</generator>
	<itunes:subtitle>Kaushal Bhavsar</itunes:subtitle>
	<itunes:summary>Diary of a Tech Geek</itunes:summary>
	<itunes:explicit>clean</itunes:explicit>
	<item>
		<title>WhatsApp Web Phishing Scam Exposed</title>
		<link>https://kaushalbhavsar.com/uncategorized/whatsapp-web-phishing-scam-exposed/</link>
					<comments>https://kaushalbhavsar.com/uncategorized/whatsapp-web-phishing-scam-exposed/#respond</comments>
		
		<dc:creator><![CDATA[Kaushal Bhavsar]]></dc:creator>
		<pubDate>Thu, 07 Sep 2023 01:39:21 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://kaushalbhavsar.com/?p=3126</guid>

					<description><![CDATA[Recently I came across a phishing page that simulated Whatsapp Web login workflow. It was really a clear clone – the QR code changed every 20 seconds and if I were in China I would have definitely needed to look at the URL carefully. What is Whatsapp Web? WhatsApp Web is essentially a web-based interface [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Recently I came across a phishing page that simulated Whatsapp Web login workflow. It was really a clear clone – the QR code changed every 20 seconds and if I were in China I would have definitely needed to look at the URL carefully.</p>



<figure class="wp-block-image aligncenter"><img decoding="async" src="https://media.licdn.com/dms/image/D4D12AQG8cTOITWNGtw/article-inline_image-shrink_1500_2232/0/1693994079144?e=1699488000&amp;v=beta&amp;t=0kBjwXxQ0wZ_BA5JTuU4OfK-WyEQRTl21baUMg7EUmw" alt=""/><figcaption class="wp-element-caption">Screenshot &#8211; Whatsapp Web Phishing Page (don&#8217;t scan this!)</figcaption></figure>



<h2 class="wp-block-heading">What is Whatsapp Web?</h2>



<p>WhatsApp Web is essentially a web-based interface of the WhatsApp application on your phone. It allows you to use WhatsApp from your web browser by scanning a QR code from your mobile app to establish a secure connection. The web interface mirrors the chats from your mobile device, enabling you to send and receive messages, share media files, and even use voice and video calls via the browser.</p>



<p>The technology behind it is a real-time, full-duplex WebSocket connection, often upgraded to a secure WebSocket (WSS) after initial authentication. This setup allows for quick and secure message syncing between the mobile device and the web interface.</p>



<h2 class="wp-block-heading">Whatsapp Web Authentication Process</h2>



<p>Before we understand the authentication mechanism, we must understand the components involved.</p>



<h3 class="wp-block-heading">Components Involved</h3>



<ol class="wp-block-list">
<li><strong>Client-Side Application</strong>: The WhatsApp application running on your mobile device.</li>



<li><strong>Server-Side Application</strong>: The backend that manages WhatsApp Web and coordinates with the client-side application.</li>



<li><strong>Web Interface</strong>: The browser interface you interact with (<a href="http://web.whatsapp.com/" target="_blank" rel="noopener">web.whatsapp.com</a>).</li>
</ol>



<h3 class="wp-block-heading">Detailed Workflow</h3>



<ol class="wp-block-list">
<li><strong>WebSocket Creation</strong>: As soon as we visit&nbsp;<a href="http://web.whatsapp.com/" target="_blank" rel="noopener">web.whatsapp.com</a>, a WebSocket connection is established between your browser and the WhatsApp Web server.</li>



<li><strong>Key Pair Generation</strong>: On the server-side, a public-private key pair is generated. The public key is used for verification, but the private key is securely stored on the server.</li>



<li><strong>QR Code Generation</strong>: The server generates a unique QR code containing a session identifier, encrypts it, and sends it along with the public key to the web interface, where it is displayed for us to scan.</li>



<li><strong>QR Code Scanning</strong>: When we scan the QR code with the WhatsApp mobile app, the session identifier and public key are decoded by the mobile app.</li>



<li><strong>Mobile Device Verification</strong>: The mobile app uses the public key to encrypt a piece of data, typically a cryptographic nonce or another session identifier, and sends it back to the server for verification.</li>



<li><strong>Server Verification</strong>: The server uses its private key to decrypt the received data. If it matches the original data, the server considers the session authenticated.</li>



<li><strong>Token Generation and Storage</strong>: Upon successful authentication, a secure token is generated and stored both on the server and the client side. This token is then used for subsequent authenticated interactions between the server and the client which is our browser.</li>
</ol>



<h2 class="wp-block-heading">How the Phishing Attack works</h2>



<figure class="wp-block-image aligncenter"><img decoding="async" src="https://media.licdn.com/dms/image/D4D12AQGq7_DBThtqdQ/article-inline_image-shrink_1500_2232/0/1693995284472?e=1699488000&amp;v=beta&amp;t=8_WiztGc3LbQeSFTAy5eFuuCZQpGaH5JZpulZ0cl7Zo" alt=""/><figcaption class="wp-element-caption">Sequence &#8211; Whatsapp Web Phishing Process</figcaption></figure>



<ol class="wp-block-list">
<li><strong>Phishing Server:&nbsp;</strong>The attacker sets up a phishing server. This server hosts a cloned web page resembling the WhatsApp Web interface.</li>



<li><strong>Fake QR Code Generation:&nbsp;</strong>Instead of sending a legitimate &#8220;WebSocket &amp; Encrypted QR Code + Public Key,&#8221; the phishing server generates a static QR code tied to the attacker&#8217;s unauthorized client.&nbsp;</li>



<li><strong>QR Code Scanning:&nbsp;</strong>The victim scans this QR code with their mobile device. Unlike in the genuine process where this would &#8220;Scan QR Code &amp; Receive Public Key,&#8221; here it sends session data to the attacker’s client.</li>



<li><strong>Session Hijacking:&nbsp;</strong>The attacker&#8217;s client receives the &#8220;Encrypted Verification Data&#8221; from the victim&#8217;s mobile device and establishes a new session by mimicking the &#8220;Decrypt, Verify &amp; Send Back Confirmation&#8221; process, thereby hijacking the WhatsApp session.</li>



<li><strong>Data Harvesting:&nbsp;</strong>With the session established, the attacker can perform actions similar to &#8220;WSS: End-to-End Encrypted Data Transfer,&#8221; but in this case, it&#8217;s unauthorized data harvesting from the victim&#8217;s WhatsApp account.</li>



<li><strong>Optional:&nbsp;</strong>Additional Phishing Fields: The attacker may include extra form fields on the phishing page to collect more data, simulating an &#8220;extra verification&#8221; process.</li>



<li><strong>Data Storage:&nbsp;</strong>All harvested data, resembling the &#8220;WSS: End-to-End Encrypted Data Transfer,&#8221; gets stored on the attacker’s phishing server instead of being securely encrypted and stored.</li>
</ol>



<h2 class="wp-block-heading">Conclusion</h2>



<p>No matter how hard we try, attackers will always find novel ways to trick users. Just like any other phishing campaign, this one also relies on using compromised servers or websites to serve phishing pages. That is why user education is the best weapon against phishing attacks. I took my time to share this with you so that you can make your near and dear ones aware of this upcoming scam.</p>



<p>Thanks for reading!</p>
]]></content:encoded>
					
					<wfw:commentRss>https://kaushalbhavsar.com/uncategorized/whatsapp-web-phishing-scam-exposed/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Decoding Cybersecurity Roles: Analyst vs. Engineer vs. Researcher</title>
		<link>https://kaushalbhavsar.com/career-advise/decoding-cybersecurity-roles-analyst-vs-engineer-vs-researcher/</link>
					<comments>https://kaushalbhavsar.com/career-advise/decoding-cybersecurity-roles-analyst-vs-engineer-vs-researcher/#respond</comments>
		
		<dc:creator><![CDATA[Kaushal Bhavsar]]></dc:creator>
		<pubDate>Sat, 02 Sep 2023 04:06:36 +0000</pubDate>
				<category><![CDATA[Career Advise]]></category>
		<guid isPermaLink="false">https://kaushalbhavsar.com/?p=3122</guid>

					<description><![CDATA[Navigating the complex world of cybersecurity can be a daunting task, especially when it comes to understanding the different roles and their responsibilities. In this landscape, Security Analysts, Security Engineers, and Security Researchers are the front-runners, each contributing in a unique way. Let&#8217;s delve into these roles and break down their distinct key skills in [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Navigating the complex world of cybersecurity can be a daunting task, especially when it comes to understanding the different roles and their responsibilities. In this landscape, Security Analysts, Security Engineers, and Security Researchers are the front-runners, each contributing in a unique way. Let&#8217;s delve into these roles and break down their distinct key skills in greater detail.</p>



<h2 class="wp-block-heading">Security Analyst</h2>



<h3 class="wp-block-heading">What They Do:</h3>



<p>Security Analysts serve as the eyes and ears of an organization&#8217;s security operations. They monitor security systems, sift through data for vulnerabilities, and lead incident response efforts.</p>



<h3 class="wp-block-heading">Key Skills:</h3>



<ul class="wp-block-list">
<li><strong>SIEM Mastery</strong>: Proficient in using Security Information and Event Management tools to aggregate and analyze logs.</li>



<li><strong>Analytical Skills</strong>: Strong ability to scrutinize complex data and deduce meaningful patterns related to security threats.</li>



<li><strong>Risk Assessment</strong>: Capable of evaluating the security posture of an organization and recommending actions to mitigate risk.</li>
</ul>



<h3 class="wp-block-heading">Typical Day:</h3>



<p>Reviewing logs, coordinating with IT teams for patches, and conducting internal security audits.</p>



<h3 class="wp-block-heading">Real-World Example:</h3>



<p>A Security Analyst at a hospital detects an unauthorized intrusion into the patient records system and coordinates incident response.</p>



<h2 class="wp-block-heading">Security Engineer</h2>



<h3 class="wp-block-heading">What They Do:</h3>



<p>Security Engineers act as the architects and builders in the realm of cybersecurity. They are responsible for the design, implementation, and management of security solutions.</p>



<h3 class="wp-block-heading">Key Skills:</h3>



<ul class="wp-block-list">
<li><strong>Firewall Management</strong>: Adept at configuring and maintaining firewalls to safeguard network security.</li>



<li><strong>Scripting and Automation</strong>: Proficiency in scripting languages like Python for automation of routine tasks.</li>



<li><strong>Compliance</strong>: Knowledgeable in industry standards like GDPR, HIPAA, and ISO 27001, and ensuring organizational adherence.</li>
</ul>



<h3 class="wp-block-heading">Typical Day:</h3>



<p>Deploying a new security tool, managing access control lists, and performing security audits.</p>



<h3 class="wp-block-heading">Real-World Example:</h3>



<p>A Security Engineer at a financial institution deploys a Web Application Firewall to protect against DDoS attacks.</p>



<h2 class="wp-block-heading">Security Researcher</h2>



<h3 class="wp-block-heading">What They Do:</h3>



<p>Security Researchers are the explorers of the cybersecurity world, unearthing new vulnerabilities and studying emerging threats.</p>



<h3 class="wp-block-heading">Key Skills:</h3>



<ul class="wp-block-list">
<li><strong>Vulnerability Analysis</strong>: Ability to find and document new security vulnerabilities, often discovering zero-days.</li>



<li><strong>Reverse Engineering</strong>: Skills in disassembling software to scrutinize its behavior and identify potential threats.</li>



<li><strong>Ethical Disclosure</strong>: Proficient in responsibly disclosing vulnerabilities to software vendors and sometimes the public.</li>
</ul>



<h3 class="wp-block-heading">Typical Day:</h3>



<p>Analyzing new malware strains, conducting controlled hacking attempts to study vulnerabilities, and publishing findings.</p>



<h3 class="wp-block-heading">Real-World Example:</h3>



<p>A Security Researcher finds a bug in a widely used IoT device and responsibly discloses the vulnerability, helping prevent potential large-scale attacks.</p>



<h2 class="wp-block-heading">Finding Your Role</h2>



<p>Identifying your role in this diverse field involves your skill set and interests.</p>



<ul class="wp-block-list">
<li><strong>Analytical?</strong> You may be best suited as a Security Analyst.</li>



<li><strong>Love to build?</strong> Security Engineering might be up your alley.</li>



<li><strong>Curious and explorative?</strong> A role in Security Research could be your calling.</li>
</ul>



<p>Each of these roles requires unique skills and forms the backbone of an effective cybersecurity ecosystem.</p>



<h2 class="wp-block-heading">Do you feel you can fit in more than one role? </h2>



<p>If you find yourself resonating with all three roles—Security Analyst, Security Engineer, and Security Researcher—you might be what the industry often refers to as a &#8220;security generalist.&#8221; Being a generalist offers its own set of advantages:</p>



<h3 class="wp-block-heading">Flexibility:</h3>



<p>You can easily transition between different security roles depending on organizational needs or project specifics. This makes you incredibly valuable to smaller organizations or startups that need a &#8220;jack-of-all-trades&#8221; in cybersecurity.</p>



<h3 class="wp-block-heading">Broader Perspective:</h3>



<p>Having skills and interests in all areas gives you a comprehensive understanding of the security landscape. This makes you adept at strategic planning, as you can foresee how decisions in one domain may impact others.</p>



<h3 class="wp-block-heading">Leadership Potential:</h3>



<p>Your broad skill set prepares you for leadership roles, like Chief Information Security Officer (CISO), where an understanding of various facets of cybersecurity is beneficial.</p>



<h3 class="wp-block-heading">Continuous Learning:</h3>



<p>If you love all three areas, chances are you&#8217;re curious. This drives you to continuously learn and stay updated, a critical trait in the ever-evolving field of cybersecurity. So if you love all three, embrace it. The field of cybersecurity has room for specialists and generalists alike. The most important thing is to find the role where you can contribute the most and continue to grow.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://kaushalbhavsar.com/career-advise/decoding-cybersecurity-roles-analyst-vs-engineer-vs-researcher/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Perform Forensic Investigation on an AWS Instance without a Public Key</title>
		<link>https://kaushalbhavsar.com/knowledgabase/how-to-perform-forensic-investigation-on-an-aws-instance-without-a-public-key/</link>
					<comments>https://kaushalbhavsar.com/knowledgabase/how-to-perform-forensic-investigation-on-an-aws-instance-without-a-public-key/#respond</comments>
		
		<dc:creator><![CDATA[Kaushal Bhavsar]]></dc:creator>
		<pubDate>Wed, 12 Jul 2023 10:43:54 +0000</pubDate>
				<category><![CDATA[knowledgabase]]></category>
		<guid isPermaLink="false">https://kaushalbhavsar.com/?p=2912</guid>

					<description><![CDATA[Introduction Performing a forensic investigation on an AWS EC2 instance can become complicated if access to the instance is lost or the SSH key is unavailable. Recently, I came upon a case where I did not have the private key to the instance. The only details I had, were the AWS portal login and password. [&#8230;]]]></description>
										<content:encoded><![CDATA[
<h2 class="wp-block-heading">Introduction</h2>



<p>Performing a forensic investigation on an AWS EC2 instance can become complicated if access to the instance is lost or the SSH key is unavailable. Recently, I came upon a case where I did not have the private key to the instance. The only details I had, were the AWS portal login and password. </p>



<p>The private key does not serve any other purpose except SSH authentication. So, if we bypass the authentication, we don&#8217;t need the key.  But the fact is, the cloud is just another computer and so, I figured out a way to make this work just like I would do it on a physical computer. </p>



<p>Here&#8217;s the process: <br>1. Detach the hard drive<br>2. Attach the hard drive to another machine<br>3. Access the data of our target system through the new machine. <br><br>Here&#8217;s a step-by-step guide on how to accomplish the same on AWS:</p>



<p></p>



<h2 class="wp-block-heading">Step 1: Creating a Snapshot of the EBS Volume</h2>



<p>The first step involves creating a snapshot of the EBS volume that&#8217;s attached to the EC2 instance. You can use the AWS CLI to accomplish this:</p>



<pre class="wp-block-code has-light-green-cyan-color has-ast-global-color-3-background-color has-text-color has-background has-medium-font-size"><code><code>aws ec2 create-snapshot --volume-id vol-049df61146f12f951 --description "Forensic snapshot"
</code></code></pre>



<h2 class="wp-block-heading">Step 2: Creating a New Volume from the Snapshot</h2>



<p>Once the snapshot is ready, you can create a new volume from it. Make sure to create it in the same availability zone as the instance you&#8217;ll be attaching it to:</p>



<pre class="wp-block-preformatted has-light-green-cyan-color has-ast-global-color-3-background-color has-text-color has-background has-medium-font-size"><code>aws ec2 create-volume --availability-zone us-west-2a --snapshot-id snap-01234567890abcdef0
</code></pre>



<h2 class="wp-block-heading">Step 3: Launching a New EC2 Instance</h2>



<p>Next, launch a new EC2 instance in the same availability zone as your volume. This instance will act as a bridge to access the data:</p>



<pre class="wp-block-preformatted has-light-green-cyan-color has-ast-global-color-3-background-color has-text-color has-background"><code>aws ec2 run-instances --image-id ami-abcd1234 --count 1 --instance-type t2.micro --key-name MyKeyPair
</code></pre>



<h2 class="wp-block-heading">Step 4: Attaching the New Volume to the New EC2 Instance</h2>



<pre class="wp-block-code has-light-green-cyan-color has-ast-global-color-3-background-color has-text-color has-background"><code><code>aws ec2 attach-volume --volume-id vol-049df61146f12f951 --instance-id i-01474ef662b89480 --device /dev/sdf<br></code></code></pre>



<h2 class="wp-block-heading">Step 5: SSH into the New EC2 Instance</h2>



<p>Next, SSH into the new EC2 instance using its own key:</p>



<pre class="wp-block-preformatted has-light-green-cyan-color has-ast-global-color-3-background-color has-text-color has-background"><code>ssh -i "/path/my-key-pair.pem" ec2-user@ec2-198-51-100-1.compute-1.amazonaws.com
</code></pre>



<h2 class="wp-block-heading">Step 6: Mounting the New Volume in Read-Only Mode</h2>



<p>This step involves creating a new directory and mounting the new volume in read-only mode. This ensures that the data on the volume isn&#8217;t altered during the investigation:</p>



<pre class="wp-block-code has-light-green-cyan-color has-ast-global-color-3-background-color has-text-color has-background"><code><code>sudo mkdir /my_new_volume
sudo mount -o ro /dev/xvdf /my_new_volume
</code></code></pre>



<h2 class="wp-block-heading">Step 7: Performing the Forensic Investigation</h2>



<p>Finally, you can navigate to the directory where you mounted the new volume and start your forensic investigation.</p>



<h2 class="wp-block-heading">Conclusion</h2>



<p>Losing SSH access to an EC2 instance doesn&#8217;t mean your investigation has to come to a halt. AWS provides a workaround by creating and using snapshots of the EBS volume associated with the instance. Remember, while performing the investigation, it&#8217;s important to ensure that the data remains unaltered. Therefore, always mount your volume in read-only mode. With these steps, you should be able to continue your investigation even in challenging scenarios.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://kaushalbhavsar.com/knowledgabase/how-to-perform-forensic-investigation-on-an-aws-instance-without-a-public-key/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Preventing Direct IP Access in CloudFlare</title>
		<link>https://kaushalbhavsar.com/updates/preventing-direct-ip-access-in-cloudflare/</link>
					<comments>https://kaushalbhavsar.com/updates/preventing-direct-ip-access-in-cloudflare/#respond</comments>
		
		<dc:creator><![CDATA[Kaushal Bhavsar]]></dc:creator>
		<pubDate>Tue, 04 Jul 2023 07:04:28 +0000</pubDate>
				<category><![CDATA[Updates]]></category>
		<guid isPermaLink="false">https://kaushalbhavsar.com/?p=2906</guid>

					<description><![CDATA[Recently, I was going through my LinkedIn feed and I found a post by Jake M. In the post, the author suggests a way to bypass Cloudflare&#8217;s protection and directly access the origin server. They propose using the &#8216;Forgot Password&#8217; feature of a web app to find the server&#8217;s IP address. If that fails, they [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Recently, I was going through my LinkedIn feed and I found <a href="https://www.linkedin.com/feed/update/urn:li:activity:7080187072707207170/" target="_blank" rel="noopener">a post by Jake M</a>. </p>



<p>In the post, the author suggests a way to bypass Cloudflare&#8217;s protection and directly access the origin server. They propose using the &#8216;Forgot Password&#8217; feature of a web app to find the server&#8217;s IP address. If that fails, they recommend sending an email to a non-existent address to receive a bounce notification with the server&#8217;s IP. That will expose the server IP and it&#8217;s possible to bypass Cloudflare&#8217;s security measures unless additional restrictions are in place. </p>



<p>Here&#8217;s how both scenarios can be visualized: <br></p>



<figure class="wp-block-image aligncenter size-full"><img fetchpriority="high" decoding="async" width="352" height="359" src="https://kaushalbhavsar.com/wp-content/uploads/2023/07/image.png" alt="" class="wp-image-2907" srcset="https://kaushalbhavsar.com/wp-content/uploads/2023/07/image.png 352w, https://kaushalbhavsar.com/wp-content/uploads/2023/07/image-294x300.png 294w" sizes="(max-width: 352px) 100vw, 352px" /><figcaption class="wp-element-caption">Scenario 1 &#8211; Using &#8216;Forgot Password&#8217; to expose Origin Server IP</figcaption></figure>



<figure class="wp-block-image aligncenter size-full"><img decoding="async" width="622" height="153" src="https://kaushalbhavsar.com/wp-content/uploads/2023/07/image-1.png" alt="" class="wp-image-2908" srcset="https://kaushalbhavsar.com/wp-content/uploads/2023/07/image-1.png 622w, https://kaushalbhavsar.com/wp-content/uploads/2023/07/image-1-300x74.png 300w" sizes="(max-width: 622px) 100vw, 622px" /><figcaption class="wp-element-caption">Scenario 2 &#8211; Using &#8216;Bounce Email&#8217; to expose Origin Server IP</figcaption></figure>



<p>The author&#8217;s research very well points out a configuration vulnerability that is really difficult to visualize. If the Origin Server IP is exposed, there is no point in having CloudFlare. And this is the same issue with any Cloud Firewall / CDN that works in Proxy mode. </p>



<p></p>



<h2 class="wp-block-heading">Suggested Workaround</h2>



<p>As suggested in the comments, the most popular workaround would be to use a 3rd party email server. In that way when the mail server&#8217;s IP address is exposed, the Origin Server IP is still hidden behind the proxy. </p>



<p>However, what if someone wants to use the mail server on the same server? Is there no way out? </p>



<h2 class="wp-block-heading">Actual Workaround &#8211; Bypass Prevention</h2>



<p>Let&#8217;s look at the situation from a different perspective. </p>



<p>Our Origin Server IP is exposed via a mail server. We may circumvent this issue by moving the mail server out of our hosting infrastructure. </p>



<p>But the fact is, there might be more than one way to expose the Origin Server IP! And we may not have discovered all of them, while attackers might have. So it&#8217;s best to assume that the IP will be exposed anyway, and work on a strategy that prevents any incident based on the exposure. The solution can be called &#8216;Bypass Prevention&#8217;. </p>



<p>Bypass Prevention is very simple &#8211; we disable direct IP access to the web application hosted on the server. To do that, we need to simply restrict the access to IP range of CloudFlare. </p>



<p>For that, we need the current Cloudflare IP ranges list. <a href="https://www.cloudflare.com/en-in/ips/" target="_blank" rel="noopener">Visit the Cloudflare IP Lists page</a> or utilize their API to obtain the latest IP range list. </p>



<p>Once we have the list, we can use the .htaccess file to provide Bypass Prevention functionality. </p>



<p>To configure IP restrictions in the .htaccess file, follow these steps:</p>



<ol class="wp-block-list">
<li>Create or edit your .htaccess file in the root directory of your website.</li>



<li>Add the following lines to the file:</li>
</ol>



<pre class="wp-block-code"><code># Block direct access to all files except from Cloudflare IPs
&lt;Files *>
    Order Deny,Allow
    Deny from all
    # Whitelist Cloudflare IP ranges
    Allow from 103.21.244.0/22
    Allow from 103.22.200.0/22
    # Add more IP ranges here if needed
&lt;/Files>
</code></pre>



<ol class="wp-block-list" start="3">
<li>Replace the example IP ranges (<code>103.21.244.0/22</code> and <code>103.22.200.0/22</code>) with the actual Cloudflare IP ranges you obtained from the sources mentioned earlier.</li>



<li>Save the .htaccess file.</li>
</ol>



<p>These rules will deny access to all files on the website for requests from IP addresses outside the specified Cloudflare IP ranges. Only requests originating from Cloudflare IPs will be allowed.</p>



<p></p>
]]></content:encoded>
					
					<wfw:commentRss>https://kaushalbhavsar.com/updates/preventing-direct-ip-access-in-cloudflare/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>23/06/2023 &#8211; BUGSKAN Chronicles Part 1</title>
		<link>https://kaushalbhavsar.com/updates/23-06-2023-bugskan-chronicles-part-1/</link>
					<comments>https://kaushalbhavsar.com/updates/23-06-2023-bugskan-chronicles-part-1/#respond</comments>
		
		<dc:creator><![CDATA[Kaushal Bhavsar]]></dc:creator>
		<pubDate>Fri, 23 Jun 2023 05:14:36 +0000</pubDate>
				<category><![CDATA[Updates]]></category>
		<guid isPermaLink="false">https://kaushalbhavsar.com/?p=2894</guid>

					<description><![CDATA[Starting a startup is every geek&#8217;s dream. Admit it, we all want a &#8220;company&#8221; of our own. It&#8217;s like a brand we build for ourselves, just like every fashion designer dreams of their private label or every waiter dreams of his own restaurant. Dreaming isn&#8217;t bad &#8211; unless we have a dream, there&#8217;s no worth [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Starting a startup is every geek&#8217;s dream. Admit it, we all want a &#8220;company&#8221; of our own. It&#8217;s like a brand we build for ourselves, just like every fashion designer dreams of their private label or every waiter dreams of his own restaurant. </p>



<p>Dreaming isn&#8217;t bad &#8211; unless we have a dream, there&#8217;s no worth living. But dreams have to be backed up with execution, and when we go to execute, we find out how naive that dream is. </p>



<h2 class="wp-block-heading">The decision to shift to cybersecurity</h2>



<p>Before BUGSKAN I was running a software development company with a small team of 5. However, I was always interested in security. In fact, I started by career by &#8220;cleaning&#8221; viruses from computers while I was still at college. I also used to manage servers on AWS and Azure for our customers and I knew security was the big thing in the next decade or so. Later, I moved to software development. </p>



<p>Running a software company was difficult then (and it is even more difficult at this moment, but more on this later), and honestly, I was getting bored. I wanted a new career. So, I created a poll titled &#8220;What do you think I am good at?&#8221; and messaged the link to about 20 people who knew me for the last 5-10 years. The most popular options were &#8220;Security&#8221; and &#8220;Teaching&#8221;. Since my financial calculation for running a training center did not turn out so well, I decided to go with Security &#8211; it was my passion and I was also pursuing my PhD in this area. </p>



<p></p>



<h2 class="wp-block-heading">I had previous experience</h2>



<p>In 2015, when I was going through this process, I was actually working at a Deep-Tech startup as a CTO and the pay was good. But the CEO/Founder was a brute. He was a bachelor and used to eat-sleep-whatever in the office. I was &#8220;just married&#8221; and I needed family time. Plus, we had creative differences. At one point of time in the investor meeting, the investor asked when they will see ROI or even any revenue. We were building something related to storage performance optimization and the code was supposed to be done in native C/C++ but I had no clue how to get it working (in fact it still isn&#8217;t working) so I suggested that while we figure out our main product, we can start selling &#8220;optimized VPS&#8221; and get revenues coming. <br>The investor was okay with it but the CEO was not. And that created a gap between him and me. I rarely received any credit for the suggestions I made, even if they were actually implemented. One day the CEO asked me for a 1-1 and said I was too slow for the company. At that point, I knew I had to quit. </p>



<p>During this short stint, I learned about product planning, management, investor relations, and many other concepts which I may have never learned in my software development consultancy. </p>



<h2 class="wp-block-heading">The return to consulting</h2>



<p>Just when I had left the previous company, one of my friends, who was now a CTO of a US-based product company, had a security incident. I reached out to him and offered him some help, and did a basic security audit for free. The next thing I remember is signing an NDA and a contract with the company for a security audit. I was ready to roll! I loved talking to their developers since I was one of them, and knowledge of security made me a great combo. At that time, I was also watching Mr. Robot. The company in Mr. Robot was &#8220;All Safe Systems&#8221; and I was really inspired by the operations of the company.</p>



<p>I took that as an inspiration and borrowing branding concepts from by customer, I registered &#8220;bugskan.com&#8221;. </p>



<p>Soon, I started taking &#8220;Dev Sec&#8221; sessions (DevSecOps was still not a thing yet) and enjoyed the attention I received. But there was a problem &#8211; the US office of my first client stopped renewing my contract. I got to know that &#8220;periodic audits are expensive&#8221;. The fact was, they were rapidly growing and the list of endpoints were growing so they needed a &#8220;fix-price annual contract&#8221;. </p>



<p>I looked at the problem &#8211; the entire security audit industry worked in &#8220;man-hour&#8221; pricing which was retrospectively priced to suit the customer budget. This made security audits for small companies unaffordable. </p>



<p>I decided to put an end to this &#8211; a Security-as-a-service platform with fixed monthly cost per application. That&#8217;s what BUGSKAN was going to be!</p>



<h2 class="wp-block-heading">The launch</h2>



<p>We created the first version and launched it online. Our platform allowed website owners to scan their web applications for security vulnerabilities. The basic free report checked for OWASP Top 10 vulnerabilities and a deep scan required paid service. At that time, I was competing with Tinfoil Security, Detectify, and so on.</p>



<div class="wp-block-uagb-image uagb-block-d767dbcf wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-none"><figure class="wp-block-uagb-image__figure"><img loading="lazy" decoding="async" srcset="https://kaushalbhavsar.com/wp-content/uploads/2023/06/748_10153981229051894_5284482055903158815_n.jpg " sizes="auto, (max-width: 480px) 150px" src="https://kaushalbhavsar.com/wp-content/uploads/2023/06/748_10153981229051894_5284482055903158815_n.jpg" alt="" class="uag-image-2899" width="960" height="718" title="" loading="lazy"/></figure></div>



<p>The project was selected as a case study for using open-source technologies on Azure and I was invited to showcase the same at Microsoft Openness Days, Hyderabad. I got feedback from senior tech architects and developers who were also facing similar problems in their daily routines. I was excited &#8211; finally, I had the product market fit, I thought. </p>



<div class="wp-block-uagb-image uagb-block-5d8db70f wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-none"><figure class="wp-block-uagb-image__figure"><img loading="lazy" decoding="async" srcset="https://kaushalbhavsar.com/wp-content/uploads/2022/12/10399568_10153980841801894_1659058591376713968_n.jpeg " sizes="auto, (max-width: 480px) 150px" src="https://kaushalbhavsar.com/wp-content/uploads/2022/12/10399568_10153980841801894_1659058591376713968_n.jpeg" alt="" class="uag-image-2523" width="960" height="718" title="" loading="lazy"/><figcaption class="uagb-image-caption">Me with new friends at Hyderabad</figcaption></figure></div>



<p>At one point, we had about 30 daily free scans. Despite that, we were not seeing any takes for the paid product and the company was surviving from my consulting revenue only. </p>



<h2 class="wp-block-heading"> The Pivot</h2>



<p class="has-text-align-left">I was frantically looking for insights, and for some platform that does not have large user interaction, it meant I needed to reach out to my users personally instead of running an analytics script. One of the users for Mahendra Sharma, CTO of Matrubharti &#8211; India&#8217;s largest ebook platform. After training their development team I was sitting with Mahendra Sharma and he told me the golden words: </p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>You send us a report but our developers will never fix each bug. I want something automatic that I can control </p>
</blockquote>



<p>This got my head spinning and I went to the whiteboard AGAIN. This was December 2016, almost a year after I started BUGSKAN. If we are doing something, and not getting results, we are doing something wrong, I thought. I remembered my research on ModSecurity in 2011 while I was teaching &#8211; ModSecurity has something called &#8220;Virtual Patching&#8221; that allows a quick fix for the vulnerability. <br>The VP is not a solution, it is just a bandage to stop infection while the wound is healing, but it happens at the click of a button so &#8211; this seemed a perfect addition to our arsenal. </p>



<p>So we registered bugshield.io domain and started working on a WAF-as-a-service platform with vulnerability scanning and automatic virtual patching. This meant more time in research and development. This also meant, less time for consulting. </p>



<p>In all, this pivot turned out to be really expensive&#8230; but how? I will share in the next part. Thanks for reading!</p>
]]></content:encoded>
					
					<wfw:commentRss>https://kaushalbhavsar.com/updates/23-06-2023-bugskan-chronicles-part-1/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>19/06/2013 &#8211; My Return to the Blogosphere</title>
		<link>https://kaushalbhavsar.com/updates/turning-a-new-page-my-return-to-the-blogosphere/</link>
					<comments>https://kaushalbhavsar.com/updates/turning-a-new-page-my-return-to-the-blogosphere/#respond</comments>
		
		<dc:creator><![CDATA[Kaushal Bhavsar]]></dc:creator>
		<pubDate>Mon, 19 Jun 2023 11:21:51 +0000</pubDate>
				<category><![CDATA[Updates]]></category>
		<guid isPermaLink="false">https://kaushalbhavsar.com/?p=2884</guid>

					<description><![CDATA[Hi, reader&#8230; You may be knowing from the past or maybe you just landed here from a search engine. Either way, I feel excited to share my journey with you. My name is Kaushal Bhavsar &#8211; I am a Ph.D. in Computer Science with a specialization in security. Like most geeks, I am passionate about [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Hi, reader&#8230;</p>



<p>You may be knowing from the past or maybe you just landed here from a search engine. Either way, I feel excited to share my journey with you. </p>



<p>My name is Kaushal Bhavsar &#8211; I am a Ph.D. in Computer Science with a specialization in security. Like most geeks, I am passionate about new technology and like sharing what I learn. </p>



<p>A decade ago, blogging was my passion. I used to blog about anything and everything I experienced in life. But I forgot blogging &#8211; why? </p>



<p></p>



<h3 class="wp-block-heading">Fast forward &gt;&gt; Present day </h3>



<p>While I am thinking why my blog looks empty, it reminds me of the key events that happened in the past ten years that got me in this situation</p>



<ol class="wp-block-list">
<li><strong>I got married</strong> &#8211; Now before you frown upon me like, &#8220;How dare you use your life partner as an excuse to do something you were to lazy to do!&#8221;, let me tell you &#8211; my partner gives me sufficient time to use the computer. She knows that it&#8217;s my &#8220;second wife&#8221; and she has well accepted the fact that sometimes, tech can get too much on my head and I forget everything else around me. The problem is me &#8211; I became introverted and secretive. I probably didn&#8217;t want to share too much of my life, and the content creation became increasingly lesser from that point.  I guess, this was a behavioural change as I began a new phase in life. Even today, I would not want to share &#8220;everything&#8221; that happens around me, but at least I can share a good part of what is helpful to my readers!</li>



<li><strong>We got a child</strong> &#8211; So this is where I was busy most of the time.  We (obviously, me and my wife) were done changing his diapers a long time ago but still, the child was our focus and in fact, we even lost focus from ourselves (and that&#8217;s how we realized that we look horrible now &#8211; but that&#8217;s for another post). Our every day was centered around the child &#8211; partly because it was exciting to recollect how we might have grown up some 25-30 years ago. </li>



<li><strong>I was working on a startup</strong> &#8211; It was called BUGSKAN (more about what went wrong with it, later). We made tools and tech to automate security operations for developers. This was while we were raising a 2-year-old child. So practically, I had two children &#8211; one was genetic and another was ideological. And then, at one point I had a team of 10 people including interns while I was running a one-man show both at home and work. Believe me, it is much tougher than it sounds. </li>



<li><strong>My mother expired</strong> &#8211; This was a year before COVID-19 started. I was off for a client meeting and she just collapsed while reaching a hospital. This was just a day after I fired my entire team so it was extremely difficult to handle two major setbacks in life. I was really shocked (all of us were) and we took about two years to come over the fact.</li>



<li><strong>We were infected by COVID-19</strong> &#8211; For those of you who have been infected, you know how this feels like. Living for 14 days in the same house and being unable to talk to our child (we used to do video calls to the &#8220;ground floor&#8221;) gave me a faint picture of what an unhealthy life would look like. The experience was life-changing on a negative note. </li>



<li><strong>I finally finished my Ph.D. Thesis</strong> &#8211; Well, this deserves a separate blog post altogether so I am not going to write anything here. But I realized there&#8217;s something called &#8220;Post Ph.D. Depression&#8221; which you don&#8217;t know until you get out of it.</li>
</ol>



<h2 class="wp-block-heading">What now? </h2>



<p>Well, now that I have given an update on what I have been up to for the last few years, I am going to restart blogging. In my journey till now, I have developed my interest in the wide spectrum of machine learning and the use of AI in cybersecurity, along with scientific research. I will be blogging on cybersecurity, startups, machine learning, and wellness based on what I have learned so far.</p>



<p>Until the next post, this is Kaushal Bhavsar signing off <img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /> </p>
]]></content:encoded>
					
					<wfw:commentRss>https://kaushalbhavsar.com/updates/turning-a-new-page-my-return-to-the-blogosphere/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Become a Technopreneur</title>
		<link>https://kaushalbhavsar.com/events/how-to-become-a-technopreneur/</link>
					<comments>https://kaushalbhavsar.com/events/how-to-become-a-technopreneur/#respond</comments>
		
		<dc:creator><![CDATA[Kaushal Bhavsar]]></dc:creator>
		<pubDate>Mon, 17 Sep 2018 06:47:00 +0000</pubDate>
				<category><![CDATA[Events]]></category>
		<guid isPermaLink="false">https://kaushalbhavsar.com/?p=2788</guid>

					<description><![CDATA[This photo captures a moment after a session on &#8220;How to Become a Technopreneur&#8221; conducted by me at GLS University. The session aimed to inspire and guide students interested in pursuing a career as a technopreneur. The students were enthusiastic and engaged throughout the session, asking questions and seeking advice on how to turn their [&#8230;]]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image aligncenter size-large"><img decoding="async" width="768" height="1024" src="https://kaushalbhavsar.com/wp-content/uploads/2023/04/41961283_937986813065111_8826884321357856768_n-768x1024.jpeg" alt="" class="wp-image-2789" srcset="https://kaushalbhavsar.com/wp-content/uploads/2023/04/41961283_937986813065111_8826884321357856768_n-768x1024.jpeg 768w, https://kaushalbhavsar.com/wp-content/uploads/2023/04/41961283_937986813065111_8826884321357856768_n-225x300.jpeg 225w, https://kaushalbhavsar.com/wp-content/uploads/2023/04/41961283_937986813065111_8826884321357856768_n.jpeg 960w" sizes="(max-width: 768px) 100vw, 768px" /></figure>



<p>This photo captures a moment after a session on &#8220;How to Become a Technopreneur&#8221; conducted by me at GLS University. The session aimed to inspire and guide students interested in pursuing a career as a technopreneur.</p>



<p>The students were enthusiastic and engaged throughout the session, asking questions and seeking advice on how to turn their ideas into successful ventures. It was inspiring to see their passion for entrepreneurship and technology, and I felt honored to have the opportunity to guide them on their journey.</p>



<p>The session was a valuable experience for both the students and me, and I left feeling hopeful for the future of technology entrepreneurship. It was an honor to be a part of GLS University and to share my knowledge and experience with the next generation of technopreneurs.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://kaushalbhavsar.com/events/how-to-become-a-technopreneur/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Session &#8211; Securing Alibaba Cloud Platform</title>
		<link>https://kaushalbhavsar.com/events/session-securing-alibaba-cloud-platform/</link>
					<comments>https://kaushalbhavsar.com/events/session-securing-alibaba-cloud-platform/#respond</comments>
		
		<dc:creator><![CDATA[Kaushal Bhavsar]]></dc:creator>
		<pubDate>Sun, 29 Jul 2018 12:50:00 +0000</pubDate>
				<category><![CDATA[Events]]></category>
		<guid isPermaLink="false">https://www.kaushalbhavsar.com/?p=2718</guid>

					<description><![CDATA[Alibaba Cloud is the latest entrant in IaaS and PaaS cloud platforms. It was recently launched in India after being successful in the Chinese subcontinent. On 28 July, we kickstarted the Alibaba community with an event highlighting the introduction of the Alibaba cloud. We had speakers like Romil Bheda, Suketu Vyas, Sanket Shah, Shyamal Pandya, [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Alibaba Cloud is the latest entrant in IaaS and PaaS cloud platforms. It was recently launched in India after being successful in the Chinese subcontinent.</p>



<p>On 28 July, we kickstarted the Alibaba community with an event highlighting the introduction of the Alibaba cloud. We had speakers like Romil Bheda, Suketu Vyas, Sanket Shah, Shyamal Pandya, and the evergreen Prabhjot Bakshi.</p>



<p>I took a session on Security in Alibaba Cloud, where I explained features of Alibaba like Server Guard, WAF, Web Security, and many more. I also highlighted the difference between the security responsibility of Alibaba as a cloud provider and developers.</p>



<p></p>



<figure class="wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter"><div class="wp-block-embed__wrapper">
<blockquote class="twitter-tweet" data-width="550" data-dnt="true"><p lang="en" dir="ltr">Security in Alibaba Cloud session by <a href="https://twitter.com/infosecboy?ref_src=twsrc%5Etfw" target="_blank" rel="noopener">@infosecboy</a>! ??<a href="https://twitter.com/hashtag/alibabacloud?src=hash&amp;ref_src=twsrc%5Etfw" target="_blank" rel="noopener">#alibabacloud</a><a href="https://twitter.com/hashtag/alibabacloudMVPtechshow?src=hash&amp;ref_src=twsrc%5Etfw" target="_blank" rel="noopener">#alibabacloudMVPtechshow</a> <a href="https://t.co/x82bN8FMPT" target="_blank">pic.twitter.com/x82bN8FMPT</a></p>&mdash; Vaibhav Bansal (@vaibhav_bansal7) <a href="https://twitter.com/vaibhav_bansal7/status/1023159906583674880?ref_src=twsrc%5Etfw" target="_blank" rel="noopener">July 28, 2018</a></blockquote><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</div></figure>



<p></p>
]]></content:encoded>
					
					<wfw:commentRss>https://kaushalbhavsar.com/events/session-securing-alibaba-cloud-platform/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Meltdown and Spectre: Understanding the Biggest Cybersecurity Threats of 2018</title>
		<link>https://kaushalbhavsar.com/vulnerabilities/meltdown-and-spectre-understanding-the-biggest-cybersecurity-threats-of-2018/</link>
					<comments>https://kaushalbhavsar.com/vulnerabilities/meltdown-and-spectre-understanding-the-biggest-cybersecurity-threats-of-2018/#respond</comments>
		
		<dc:creator><![CDATA[Kaushal Bhavsar]]></dc:creator>
		<pubDate>Fri, 26 Jan 2018 16:56:00 +0000</pubDate>
				<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">https://kaushalbhavsar.com/?p=2858</guid>

					<description><![CDATA[The Meltdown and Spectre vulnerabilities, discovered in January 2018, were among the biggest cybersecurity threats of the year. In this blog post, we&#8217;ll provide a comprehensive analysis of these vulnerabilities and their impact. The Vulnerabilities Explained Meltdown and Spectre are hardware vulnerabilities that affect nearly all modern processors. Meltdown allows an attacker to access kernel [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>The Meltdown and Spectre vulnerabilities, discovered in January 2018, were among the biggest cybersecurity threats of the year. In this blog post, we&#8217;ll provide a comprehensive analysis of these vulnerabilities and their impact.</p>



<h2 class="wp-block-heading">The Vulnerabilities Explained</h2>



<p>Meltdown and Spectre are hardware vulnerabilities that affect nearly all modern processors. Meltdown allows an attacker to access kernel memory and read sensitive information, while Spectre enables an attacker to trick programs into leaking information.</p>



<p>Meltdown takes advantage of a vulnerability in the way that modern processors handle speculative execution, which is a technique used to improve processing speed. By exploiting this vulnerability, an attacker can access privileged memory areas and read sensitive information, such as passwords and encryption keys.</p>



<p>Spectre, on the other hand, takes advantage of a vulnerability in the way that programs interact with each other. By tricking one program into leaking information, an attacker can gain access to sensitive data from other programs.</p>



<h2 class="wp-block-heading">The Breach Timeline</h2>



<ul class="wp-block-list">
<li>Mid-2017: Researchers from Google&#8217;s Project Zero discover the Meltdown and Spectre vulnerabilities.</li>



<li>January 3, 2018: The vulnerabilities are publicly disclosed.</li>



<li>January 4-5, 2018: Hardware vendors and software developers are given a grace period to develop and release patches to mitigate the vulnerabilities.</li>



<li>January 9, 2018: Intel confirms that its processors are vulnerable to Meltdown and Spectre, and issues a statement that the company is working with other vendors to address the issue.</li>



<li>January 11, 2018: Researchers from Graz University of Technology in Austria release a proof-of-concept attack for Meltdown, demonstrating the severity of the vulnerability.</li>



<li>January 17, 2018: Intel releases firmware updates to address the vulnerabilities, but the updates cause performance issues and stability problems on some systems.</li>



<li>January 25, 2018: Microsoft releases an emergency Windows update to address the vulnerabilities.</li>



<li>February 7, 2018: Researchers from Google and Microsoft disclose a new variant of Spectre, known as Variant 4, which exploits the same vulnerability as the original Spectre but uses a different technique.</li>



<li>March 15, 2018: Researchers from Red Hat discover a new variant of Spectre, known as Variant 1.1, which exploits a different aspect of speculative execution than the original Spectre.</li>
</ul>



<h2 class="wp-block-heading">The Impact and Aftermath</h2>



<p>The Meltdown and Spectre vulnerabilities had far-reaching consequences for nearly all computer users. Because the vulnerabilities were hardware-based, they affected nearly all modern processors, including those in desktops, laptops, servers, and mobile devices.</p>



<p>The vulnerabilities were particularly dangerous because they could be exploited by attackers without leaving any trace. This meant that an attacker could steal sensitive data without the victim even realizing it.</p>



<p>The impact of the vulnerabilities was felt across the tech industry, with companies scrambling to release patches and updates to mitigate the vulnerabilities. The vulnerabilities also highlighted the need for ongoing security research and the importance of collaboration between researchers, hardware vendors, and software developers.</p>



<h2 class="wp-block-heading">Lessons Learned</h2>



<p>The Meltdown and Spectre vulnerabilities offer several key takeaways and lessons. For instance, these vulnerabilities underscore the need for ongoing security research and the importance of collaboration between researchers, hardware vendors, and software developers.</p>



<p>The vulnerabilities also demonstrated the importance of proactive security testing and patch management to minimize the risk of exploitation. Organizations should conduct regular vulnerability assessments and implement timely patching to protect against similar incidents in the future.</p>



<h2 class="wp-block-heading">Expert Insights</h2>



<p>We reached out to several cybersecurity experts to get their take on the Meltdown and Spectre vulnerabilities. Here are some of their insights:<br></p>



<ul class="wp-block-list">
<li>According to Chris Morales, Head of Security Analytics at Vectra, &#8220;Meltdown and Spectre were two of the most impactful vulnerabilities discovered in the past decade because they affected nearly every computer on the planet.&#8221; [source: Dark Reading]</li>



<li>Jeff Pollard, VP and Principal Analyst at Forrester, emphasizes that &#8220;the Meltdown and Spectre vulnerabilities highlight the need for hardware vendors and software developers to collaborate more closely to ensure that security is built into products from the outset.&#8221; [source: Dark Reading]</li>



<li>Chris Kennedy, CISO at AttackIQ, notes that &#8220;the Meltdown and Spectre vulnerabilities demonstrate the importance of proactive security testing and patch management to minimize the risk of exploitation.&#8221; [source: CSO Online]</li>
</ul>



<h2 class="wp-block-heading">Conclusion</h2>



<p>The Meltdown and Spectre vulnerabilities were a stark reminder of the importance of ongoing security research and the need to protect against hardware vulnerabilities. By understanding the intricacies of major security incidents like Meltdown and Spectre, individuals and organizations alike can take proactive measures to prevent future breaches.</p>



<p>It&#8217;s clear that the threat landscape is constantly evolving, and that cybersecurity must be a top priority for businesses and individuals alike. By staying vigilant and taking proactive steps to protect against threats, we can help ensure that the internet remains a safe and secure place for all users.</p>



<h2 class="wp-block-heading">Additional Resources</h2>



<ul class="wp-block-list">
<li><a href="https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" target="_blank" rel="noopener">Google Project Zero: Reading Privileged Memory with a Side-Channel</a></li>



<li><a href="https://meltdownattack.com/" target="_blank" rel="noopener">Meltdown and Spectre: Vulnerabilities in Modern Computers Leak Passwords and Sensitive Data</a></li>



<li><a href="https://www.intel.com/content/www/us/en/architecture-and-technology/facts-about-side-channel-analysis-and-intel-products.html" target="_blank" rel="noopener">Intel Responds to Security Research Findings</a></li>



<li><a href="https://support.microsoft.com/en-us/help/4072698/windows-server-guidance-to-protect-against-the-speculative-execution" target="_blank" rel="noopener">Microsoft Guidance to Protect Against Speculative Execution Side-Channel Vulnerabilities</a></li>



<li><a href="https://www.redhat.com/en/topics/security/spectre-meltdown" target="_blank" rel="noopener">Spectre and Meltdown: What You Need to Know</a></li>
</ul>
]]></content:encoded>
					
					<wfw:commentRss>https://kaushalbhavsar.com/vulnerabilities/meltdown-and-spectre-understanding-the-biggest-cybersecurity-threats-of-2018/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Equifax Data Breach: A Comprehensive Analysis</title>
		<link>https://kaushalbhavsar.com/vulnerabilities/equifax-data-breach-severity-and-quantifying-the-threat/</link>
					<comments>https://kaushalbhavsar.com/vulnerabilities/equifax-data-breach-severity-and-quantifying-the-threat/#respond</comments>
		
		<dc:creator><![CDATA[Kaushal Bhavsar]]></dc:creator>
		<pubDate>Tue, 26 Sep 2017 16:28:00 +0000</pubDate>
				<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">https://kaushalbhavsar.com/?p=2850</guid>

					<description><![CDATA[In 2017, Equifax, one of the largest credit reporting agencies in the world, suffered a massive data breach that exposed the personal information of millions of individuals. In this blog post, we&#8217;ll provide a comprehensive analysis of the Equifax data breach and its impact. The Breach Timeline The Key Players Equifax was the primary organization [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>In 2017, Equifax, one of the largest credit reporting agencies in the world, suffered a massive data breach that exposed the personal information of millions of individuals. In this blog post, we&#8217;ll provide a comprehensive analysis of the Equifax data breach and its impact.</p>



<h2 class="wp-block-heading">The Breach Timeline</h2>



<ul class="wp-block-list">
<li>March 7, 2017: The Department of Homeland Security warns Equifax of a critical vulnerability in the company&#8217;s systems.</li>



<li>March 9, 2017: Equifax patches the vulnerability, but does not inform affected customers or the public.</li>



<li>May-July 2017: Hackers exploit the vulnerability and gain access to Equifax&#8217;s systems.</li>



<li>July 29, 2017: Equifax discovers the breach and begins an investigation.</li>



<li>September 7, 2017: Equifax publicly announces the data breach.</li>



<li>September 8, 2017: Equifax shares drop 13 percent, wiping out $2.4 billion in market value.</li>



<li>September-October 2017: Equifax faces backlash from consumers, lawmakers, and regulators for its handling of the breach.</li>
</ul>



<h2 class="wp-block-heading">The Key Players</h2>



<p>Equifax was the primary organization involved in the breach. The company was responsible for safeguarding the personal information of millions of individuals, but failed to do so adequately. In addition, the breach revealed the larger systemic issue of the role of credit reporting agencies in modern society and the lack of oversight and accountability in the industry.</p>



<h2 class="wp-block-heading">The Vulnerabilities Exploited</h2>



<p>The Equifax data breach was caused by a critical vulnerability in the company&#8217;s web application framework. The vulnerability allowed hackers to exploit a flaw in the Apache Struts software used by Equifax. Although a patch for the vulnerability was available at the time of the breach, Equifax failed to apply the patch in a timely manner.</p>



<h2 class="wp-block-heading">The Impact and Aftermath</h2>



<p>The Equifax data breach was one of the largest and most damaging data breaches in history. The personal information of 147 million individuals was exposed, including Social Security numbers, birth dates, addresses, and other sensitive information.</p>



<p>The breach had significant financial and reputational repercussions for Equifax. The company faced multiple lawsuits, regulatory investigations, and fines, including a $700 million settlement with the Federal Trade Commission. In addition, the breach eroded consumer trust in Equifax and the credit reporting industry as a whole.</p>



<h2 class="wp-block-heading">Lessons Learned</h2>



<p>The Equifax data breach offers several key takeaways and lessons. For instance, the breach underscores the importance of timely and effective patch management to prevent vulnerabilities from being exploited. It also highlights the need for greater oversight and regulation of the credit reporting industry to ensure that consumer data is protected.</p>



<h2 class="wp-block-heading">Expert Insights</h2>



<p>We reached out to several cybersecurity experts to get their take on the Equifax data breach. Here are some of their insights:</p>



<ul class="wp-block-list">
<li>According to Adam Levin, founder of CyberScout and author of Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves, &#8220;The Equifax breach was one of the most significant cyberattacks in history because it involved the breach of an entity that is central to our financial lives.&#8221; [source: USA Today]</li>



<li>Paul Ducklin, senior technologist at Sophos, emphasizes that &#8220;the Equifax breach was a reminder that security is only as good as the weakest link in the chain, and that the security practices of our partners and suppliers can affect us as much as our own practices.&#8221; [source: Naked Security]</li>
</ul>



<h2 class="wp-block-heading">Conclusion</h2>



<p>The Equifax data breach was a wake-up call for individuals and organizations alike, highlighting the importance of strong cybersecurity </p>



<p>practices and effective data protection measures. By understanding the intricacies of major security incidents like the Equifax data breach, individuals and organizations can take proactive measures to prevent future breaches.</p>



<p>It&#8217;s clear that the threat landscape is constantly evolving, and that cybersecurity must be a top priority for businesses and individuals alike. By staying vigilant and taking proactive steps to protect against threats, we can help ensure that sensitive data remains secure and that the internet remains a safe place for all users.</p>



<h2 class="wp-block-heading">Additional Resources</h2>



<ul class="wp-block-list">
<li><a href="https://www.experian.com/blogs/ask-experian/equifax-data-breach-what-you-need-to-know/" target="_blank" rel="noopener">Equifax Data Breach: What You Need to Know</a></li>



<li><a href="https://www.consumer.ftc.gov/blog/2019/07/equifax-data-breach-settlement-what-you-need-know" target="_blank" rel="noopener">Equifax Data Breach Settlement: What You Need to Know</a></li>



<li><a href="https://www.cnbc.com/2019/09/07/the-equifax-data-breach-was-the-worst-in-history-how-you-can-protect-yourself.html" target="_blank" rel="noopener">The Equifax Data Breach Was the Worst in History—How You Can Protect Yourself</a></li>



<li><a href="https://www.nytimes.com/guides/business/equifax-data-breach-updates" target="_blank" rel="noopener">The Equifax Data Breach: What Happened and What to Do Next</a></li>



<li><a href="https://www.creditcards.com/credit-card-news/equifax-data-breach-guide/" target="_blank" rel="noopener">Equifax Data Breach: A Complete Guide to Protecting Your Credit</a></li>
</ul>
]]></content:encoded>
					
					<wfw:commentRss>https://kaushalbhavsar.com/vulnerabilities/equifax-data-breach-severity-and-quantifying-the-threat/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
