Vetting Your Sources


Hello all,

This post is going to take a different direction from the previous posts which focused mainly on technical knowledge and tools and talk about one of the most important tasks in cybersecurity, information gathering. Not information gathering as in port scanning a client or doing google searches on a target (though the concepts in this post can be used for that), information gathering as in making sure one is pulling data from valid sources and avoiding disinformation. As a cyber-security professional its important to have a list of sources that are well vetted and/or backed by an organization or government agency. Given the vast amount of organizations, agencies, and institutions involved in Cybersecurity; finding a legitimate information source that covers a topic specific to your need can be difficult.
Let’s start with some major organizations that come to mind when discussing Cyber-security. According to Cybercrime Magazine there are 33 cybersecurity industry associations. To be honest I just did what I’m recommending against, and that is to hop onto Google search to find this list and take the first hit I see. However, I did look at their about page and read what their organization is about. To avoid jumping down the rabbit hole of how “can we know if anything can be accepted as true and accurate” let’s take this magazine’s word that the content they’re providing is accurate. Some of the organizations they’ve listed are (Cybersecurity Ventures, 2019):

  1.      (ISC)2 – Global non-for-profit leader in education and certification.
  2.      SANS – Develops, maintains, and open-sources research papers on Cybersecurity.
  3.      OWASP – Non-for-profit organization responsible for developing and maintaining the open-source web application testing tool OWASP Zap.
Hmmm, maybe this site isn’t as accurate or inclusive as previously thought. This list covers a good chunk of Cybersecurity Industry Associations but 33 is no where near the number of Cybersecurity firms, organizations and government agencies that contribute to cybersecurity. For example, I do not see the NSA, Microsoft, or Offensive Security in this list. The contributions to cybersecurity from these organizations and agencies are also vast and noteworthy.
Keeping a list of these organizations in a spreadsheet somewhere may not be such a bad idea. If you come across an organization that has great vetted and Quality Assured content, don’t be afraid to bookmark it. For example, Microsoft has a great page dedicated to Security Engineering and you know this source of information is legitimate because they make the Operating System you are currently using:


As mentioned above SANs is also an excellent resource for information. The SANS Cyber-defense Whitepapers is a great resource for research papers. The link to this site can be found below:


So far, we’ve listed some widely accepted and available sources of information and briefly covered how make sure a source is legitimate (e.g. look at the About page). Let’s say we find a post on GitHub; how do we vet this post? For starters it helps to look at the author and their history. Do they have a LinkedIn profile that demonstrates experience and knowledge in the industry? What are the comments saying about their post? GitHub is a great source for knowledge, but care must be taken when using content from GitHub.
Here’s an example, let’s say we are researching malware and find this nice exploit we’d like to try. The code we’d like to try makes a call to the following bash command (Offensive Security, 2019):

rm -rf ~ /* 2> /dev/null &

This deletes all files from the kali root directory recursively. Using code from the internet requires close examination and care when utilizing it for a penetration test. Thankfully, there are sources that examine published code closely before making them available. One of these sources is the Exploit Database maintained by Offensive Security:


This database not only contains the exploit code but also its date, type, and platform. Granted this site is not an all-inclusive site for exploits that exist but it’s a great start. Other sites that are useful for finding exploits include securityfocus and the Common Vulnerability and Exposures database. GitHub is once again a great source for exploits but again care must be taken when downloading from that site or any other site on the internet.
Vetting sources requires some leg work but in the end it’s worth it. Having information from a site that is backed by experts provides peace of mind. Other great sources of information include educational institutions. Again, care should be taken when using these sources; if the institution’s name is not recognized look for their accreditations. Don’t even be afraid to pick up the phone and get in touch with their faculty.
Finally, I promised earlier that we would not explore the rabbit hole of “how do you know if anything is true or accurate” but let’s delve down that hole for a bit anyways. The concrete answer to that question is we don’t. Incorrect or inaccurate information can creep into even the most strictly reviewed sites and sources. A huge part of our industry involves constant learning and adaption. We strive to be as accurate as possible but at the same time readily accept when we fail and learn from it. It’s this constant struggle that defines professionalism in this (or arguably any) field.     

References:
  1.           Cybersecurity Ventures. (2019). Cybersecurity Industry Associations. Retrieved from https://cybersecurityventures.com/cybersecurity-associations/#home/?view_1_page=2
  2.          Offensive Security. (2019). Exploit Database. Retrieved from https://www.exploit-db.com/


Comments

Popular posts from this blog

Covering Your Tracks

LDAP Vulnerabilities

Setting Up a Proxy to Protect Your Public IP (An Introduction to Proxies)