[HN Gopher] Infosec Core Competencies
___________________________________________________________________
 
Infosec Core Competencies
 
Author : kiyanwang
Score  : 85 points
Date   : 2021-06-13 10:38 UTC (12 hours ago)
 
web link (www.netmeister.org)
w3m dump (www.netmeister.org)
 
| unethical_ban wrote:
| If you get decent at 3/4 of this list, you're in the top 5% of
| infosec professionals. Not that knowing all of these is bad, but
| you do not need to have all of these skills to be a well paid,
| in-demand infosec worker. It also depends on what subfield you're
| going in.
| 
| Are you going to be the only Infosec person at a small company?
| You need to know a lot more breadth than if you're going to be
| the email security gateway admin at a behemoth bank.
 
| tptacek wrote:
| I'm at bullet one of this list and immediately, entirely
| skeptical, since that bullet suggests that a common core
| competency of infosec people is evaluating a CVE by its CVSS
| score (which, we're told, has meaning relative to your own
| environment; that's where the art lies, presumably).
| 
| But CVSS is an industry-wide joke. It means almost literally
| nothing (a 9+ is usually, but not always, more severe than a 2).
| It's a Ouija board, computed by a mysterious calculator and
| adjusted by imperceptible nudges until the score matches the
| intuitions of the scorer.
 
  | lucb1e wrote:
  | > a 9+ is usually, but not always, more severe than a 2
  | 
  | which is exactly why learning to read these things (the full
  | vector, I believe is what the author meant rather than just the
  | resulting number) is useful when looking at a list of CVEs.
  | Will it tell you the full story and everything you need to
  | know? Of course not. Will it tell you what the impact for your
  | business situation will be? Nope. Does it help you initially
  | filter out the network-accessible no-privileges-required
  | vulnerabilities that apply to your situation because you aren't
  | local on the host and don't have credentials? Yes, that's where
  | it's helpful.
  | 
  | My employer chose to use CVSS vectors to avoid discussions
  | about whether something should be e.g. low/medium/high impact,
  | and frankly I disagree with them. We still have discussions
  | while it limits our ability to represent the likelihood of
  | exploitation, the impact, or the resulting risk. So I'm fully
  | on board that CVSS is very often not representative, especially
  | the final score but sometimes also it just doesn't ask the
  | right 'questions' (the parameters) to reflect what the problem
  | or impact is. But I can still see what the author meant about
  | reading a CVSS vector specified for a CVE.
 
| 1MachineElf wrote:
| Title should be adjusted to the actual title of the blog post:
| _(Technical)_ Infosec Core Competencies
| 
| InfoSec is a management practice. These technical skills are nice
| to have, but with the exception of #1 (understanding CVEs, CWEs,
| and CVSSs), you do not need the skills on this list in order to
| acquire and be productive in an InfoSec job. Someone with these
| technical skills is cut out to be a security researcher, part of
| a Red Team, working on the detection side of a SOC, or similar.
| Those are great and valuable roles, but not quite InfoSec. For an
| InfoSec job, give me someone who knows security management
| frameworks, can read security guidance, who can lead on processes
| we use to manage IT security, who can generate (and optionally
| build) security status reports, who gets the organizational chain
| of command for how IT security work gets done.
 
| lucb1e wrote:
| This actually helps with impostor syndrome. Not what I came here
| for, but the effect I notice. Since I've been doing the job, I
| figured I can pull it off mostly but... it often still feels like
| I barely know what I'm doing.
| 
| Reading this list, the topics are quite varied from network to
| filesystem to scripting, and yet I'm definitely confident in 47
| of these 50 topics. Two of the remaining three I can do as
| specified, but not more deeply. For the final one, I already knew
| I'm lacking ($cloud vendor specific permission stuff) but I just
| don't find that area very motivating even if it looks like the
| established cloud vendors are here to stay. Feels rather dull to
| memorize vendor-specific words for established techniques and
| learn platform-specific attacks like the metadata service on AWS.
| 
| Anyway, it also seems like a good list (nice to say when you just
| said you know basically all of this? heh), because the topics are
| so varied yet it seems to aptly cover what I indeed use in daily
| work. Some points are more rare of course, like PMS logging for
| Wireshark (most of the time you do MITM rather than make the
| client log decryption keys), but still good to know of. I will
| probably refer to this next time someone asks me how to get into
| security! My answers to that question were previously quite
| basic, like just read up on attacks for the systems you're
| interested in or familiar with, or start with the OWASP top 10 if
| you don't know where to start. Then again, this list might also
| seems daunting if you need to ask the question of how to get
| started, hmm.
| 
| One thing to perhaps add would be subnetting / network isolation.
| It's not something you need in every assignment, but more often
| than you might think. Even if you do a simple web assignment and
| you find an SSRF through which you can obtain something
| important, being able to explain what isolation they are lacking
| and how it's supposed to be implemented without being able to
| bypass e.g. the VLAN tagging is helpful to your client (even if
| only the most high-security organisations care to properly
| implement it). The list mentions CIDRs, but knowing that there
| exists such a thing as IP ranges is of course not the whole
| story.
| 
| Also, the number of times the customer came with an isolated
| offline environment for either exams or sensitive systems... with
| a recursive DNS resolver... But I suppose #22 could cover that
| even if it doesn't specifically mention DNS tunneling.
 
| easterncalculus wrote:
| I like the objective of this article and most of what's in it but
| I think it leaves itself open to criticism.
| 
| I have doubts about the benefit of even implying a sense of
| objectivity to these so-called requirements because infosec is
| such a wide field and people from all over can and do never deal
| with a lot of these things.
| 
| A lot of folks in the industry would say that this lacks mention
| of LDAP, SAML, and other key protocols. Many folks would say that
| this is a very *NIX-centric list of utilities, or will work an
| entire career and never even see SPF or DNSSEC. Many pentesters
| would say that your understanding of security is only as good as
| your knowledge of how to break it, and insist on many more
| vulnerability types and tools as "core competencies" to this
| list. There's plenty of work being done in securing smart
| contracts and other cryptocurrency systems, so it's clearly
| opinion to insist on people avoiding it. Personally speaking, I
| think the insistence that there are tons of cryptocurrency people
| that don't know what cryptography is melodramatic and at some
| level not really possible. The idea of said people not knowing
| even what cryptography is while evangelizing about it is a
| contradiction. At this point most folks' beliefs on it are
| heavily correlated to personal politics, from people condemning
| or proclaiming it. That's a whole other topic, which is another
| reason why any binding opinions on it are not something I would
| include in an infosec core competencies list.
| 
| All this being said, I think getting to a consensus on what to
| learn is a good idea, and there are plenty of things that I
| personally agree with in this list, many or most of them even.
| The author is clear and up-front about it being based on his
| experience, but it appears pretty heavily so. It's still good,
| but I think this list would be better as a Git repository than a
| blog post.
 
| hirako2000 wrote:
| While I agree with the bag of technical knowledge desirable for
| an infosec job, it's worth noting that many who hold such role
| have pivoted from another more or less technical field of work. A
| software developer who got familiar with networking, crypto,
| pentesting along the years makes a smooth transition within the
| same company, ramps up with the details in a few weeks and
| proudly wears the hat. Similarly, devops/cloud/site reliability
| enginners, and more commonly sysadmins, and security consultants
| have an easy time transitioning.
 
| galacticaactual wrote:
| This is not a good list.
| 
| A better use of time is to internalize the ATT&CK matrix and
| compose multi-axis controls and detections for each tactic and
| technique.
 
  | tptacek wrote:
  | I don't really think there are any lists like this that are
  | "good", but I also don't know many people in the field that
  | don't roll their eyes at ATT&CK these days.
 
    | easterncalculus wrote:
    | When it comes to ATT&CK I have personally seen people go
    | 50/50 on it, with most support coming from those in large
    | enterprises. It's a pretty good resource for pentesting or
    | red-team engagements, but probably could use less
    | evangelizing.
 
      | tptacek wrote:
      | I spent from 2005 until ~last year running pentest
      | engagements, for what it's worth.
 
        | easterncalculus wrote:
        | I definitely haven't. Is it something you reference? Some
        | of the technical aspects seem as fine as anything you
        | could google, but the whole kill-chain thing always
        | seemed a little overblown. I agree with your comment
        | about it not benefiting practitioners as much.
 
    | galacticaactual wrote:
    | Is your thesis that spending time analyzing and decomposing
    | TTPs in the framework a waste of time? If it were, I would
    | agree. My assertion is that it is not.
    | 
    | As far as embedding the TTPs in every marketing white paper
    | out there, yeah, agree that's dumb.
 
      | tptacek wrote:
      | I don't love the term "TTP", but I'm not an IR person.
      | 
      | I don't think cataloguing things is intrinsically a waste
      | of time.
      | 
      | I do think that a unified theory of how networks and
      | computers are compromised is a pipe dream that doesn't
      | reward the effort put into building or studying it.
      | 
      | Mostly, I think ATT&CK has done far more good for vendors
      | as the basis for feature/function/benefit breakdowns than
      | it has for practitioners.
      | 
      | Like I said, there are no "good" lists.
 
        | galacticaactual wrote:
        | You have one engineer that you send to enumerate the
        | "Credential Dumping" TTP, read every reference, and model
        | controls and detections. Mimikatz? Great, recompile the
        | source code, modify the args, what's left and how do you
        | protect / detect? DCsync? How does it work? What events
        | are triggered? How do you mitigate through defensive
        | controls?
        | 
        | You have another that you send to read about cached
        | credentials in a textbook.
        | 
        | You're telling me the former does not come out ahead of
        | the latter?
 
        | tptacek wrote:
        | I don't know, maybe most of what you're saying here is
        | that ATT&CK is useful if you're a Windows admin. I may be
        | biased, since I work primarily in software security and
        | vulnerability research, and not IT security.
 
        | galacticaactual wrote:
        | No offense, but your comments are indicative of an epic
        | chasm between the nature of attacks happening on a daily
        | basis at enterprises everywhere and the work being done
        | by many in Infosec, even those held in high regard.
 
        | tptacek wrote:
        | None taken. I mean what I said. If you're an enterprise
        | Windows IT security person, I'm prepared to accept that
        | ATT&CK is important to you as a practitioner. You can
        | tell me that attacks on corporate Windows infrastructure
        | are the most important problem in information security; I
        | won't litigate that.
 
        | lucb1e wrote:
        | > an epic chasm between the nature of attacks happening
        | on a daily basis at enterprises everywhere and the work
        | being done by many in Infosec
        | 
        | Because they're not listening when we tell them to not
        | roll their own crypto!
        | 
        | Or in a more serious tone: organisations often ignore
        | best current practices, even after they spent a lot of
        | money to have us look at their work and we told them what
        | mistakes we found. Maybe we should indeed work more on
        | making it easier to do things right, rather than just
        | telling them how to do it right. It feels a bit like how
        | you can at least distribute free needles to avoid
        | infectious diseases when you can't stop people from being
        | addicted to drugs.
        | 
        | Although if you look at pure research (not just advice
        | not being followed), the gap indeed gets even bigger.
        | Things like formal verification is great for academics
        | but what would really help organisations is robust
        | append-only, easy-to-restore backups to recover without
        | paying after their stuff got encrypted again. But that's
        | not sexy clever research, that's just some plumbing.
        | While that sort of plumbing is not typically considered
        | our job as security testers, it would be a solution that
        | can make a real difference when looking at the attacks
        | being done. (Criminals can still try blackmailing, but
        | that seems to be much less lucrative on average, and good
        | backups are also useful for accidental data destruction.)
 
        | lucb1e wrote:
        | > I spent from 2005 until ~last year running pentest
        | engagements, for what it's worth. [1h ago
        | https://news.ycombinator.com/item?id=27494895]
        | 
        | > I don't know, [...] I work primarily in software
        | security and vulnerability research, and not IT security.
        | [52m ago, parent post]
        | 
        | Umm, so do you think IT security (I'd say pentests fall
        | well within IT security, let me know if that's where you
        | disagree) is within your competency or not?
 
        | tptacek wrote:
        | IT security is a different specialization than any sense
        | of the term "pentesting". IT security people engage
        | pentesters, in the same sense that pentesters engage IT
        | infrastructure in order to, like, send emails and stuff.
 
        | lucb1e wrote:
        | Interesting, I do penetration tests as my day job and
        | would therefore say that means I'm working in IT
        | security. But also I'm not a native english speaker so I
        | might just be wrong. Just to make sure, what you call IT
        | security is the securing of IT infrastructure, and what
        | penetration testers do is, well, the testing thereof?
 
        | tptacek wrote:
        | IT security is desktop and corporate infrastructure
        | server security (file servers, email, directory), usually
        | along with corporate network security (very big companies
        | sometimes have distinct network security teams, but if
        | you don't have that, IT security owns network security
        | --- the wifi access points, the access routers, any weird
        | 8021x-type stuff you're doing, etc).
        | 
        | As soon as you move into prod servers you're typically
        | talking about cloud/infrasec people, who are distinct
        | from IT security people. Infrasec: IAM; IT Security:
        | Active Directory.
        | 
        | As soon as you move to actual code that the corporation
        | writes/maintains, you're in appsec. If your IT security
        | group owns appsec, you're not doing appsec.
 
        | OminousWeapons wrote:
        | > I don't know, maybe most of what you're saying here is
        | that ATT&CK is useful if you're a Windows admin
        | 
        | Aren't Windows shops the primary audience for ATT&CK?
 
        | tptacek wrote:
        | They're the primary consumers of it, but I don't think it
        | follows that they're the intended audience for it; ATT&CK
        | is expansive.
 
| hn8788 wrote:
| Missing the most important one; being able to communicate
| security issues to non-security people. It doesn't matter that
| youre a super hacker if you cant explain why people should
| listen, or report your findings without the devs feeling like
| it's a personal attack.
 
  | ozim wrote:
  | I up voted but there is place for super technical people who
  | are not good at explaining.
  | 
  | There is also a lot of place for people who understand stuff
  | technically but are not exploiting boxes days in days out, that
  | can talk and explain in more general terms lots of those
  | things.
 
| ______- wrote:
| You also have to have a rebellious and slightly sly streak in
| you. This helps if you're going to do social engineering. You may
| have to learn to be more charismatic or learn superficial
| charm[0] and be able to play people's emotions.
| 
| Another thing: some people just fall into
| blackhat/whitehat/greyhat hacking naturally after learning that
| Everything is Broken[1].
| 
| [0] https://en.wikipedia.org/wiki/Superficial_charm
| 
| [1] https://medium.com/message/everything-is-broken-81e5f33a24e1
| 
| > Once upon a time, a friend of mine accidentally took over
| thousands of computers. He had found a vulnerability in a piece
| of software and started playing with it. In the process, he
| figured out how to get total administration access over a
| network. He put it in a script, and ran it to see what would
| happen, then went to bed for about four hours. Next morning on
| the way to work he checked on it, and discovered he was now lord
| and master of about 50,000 computers. After nearly vomiting in
| fear he killed the whole thing and deleted all the files
| associated with it. In the end he said he threw the hard drive
| into a bonfire. I can't tell you who he is because he doesn't
| want to go to Federal prison, which is what could have happened
| if he'd told anyone that could do anything about the bug he'd
| found. Did that bug get fixed? Probably eventually, but not by my
| friend. This story isn't extraordinary at all. Spend much time in
| the hacker and security scene, you'll hear stories like this and
| worse.
 
___________________________________________________________________
(page generated 2021-06-13 23:01 UTC)