Tag Archives: infosec

25 Years of Nmap: Happy Scan-iversary!

Post Syndicated from Tod Beardsley original https://blog.rapid7.com/2022/09/01/25-years-of-nmap-happy-scan-iversary/

25 Years of Nmap: Happy Scan-iversary!

I didn’t know it then, but on September 1, 1997, my life changed. That was the day that Fyodor’s Nmap was first released to the world, courtesy of the venerable Phrack magazine. (By the way, check out our recent podcast with Fyodor himself if you haven’t yet.) At the time, I had just started my legitimate IT career, but boy oh boy, I was in the thick of it when it came to hackery hijinks. I won’t admit to any crimes or anything in this, my now-very-legitimate company’s blog post, but let me tell you: 1997 was a truly magical time for the nascent field of what would eventually become known as information security.

At the risk of making this sound like a “kids-these-days/back-in-my-day” kind of blog post, let me just say that if you wanted to probe and profile computers — yes, even computers you owned, legitimately — your choices were simultaneously limited and practically unbounded. In order to conduct network scanning, you had a bunch of tools available to you, all of which worked a little differently, ranging from “completely broken” to “kind of okay for some users.” People who were into this sort of thing generally got frustrated with the tooling floating around and wrote their own, which meant that their tools tended to only work for them, since these projects were heavily dependent on that one person’s local operating system configuration.

Nmap changed all that.

Early infosec’s magic moment

From the outset, Nmap was a simple tool that literally fit in a magazine article about network scanning tactics and tricks. It was two files of about 2,100 lines of code, and unlike many hacker tools of the day, it actually compiled for me on the first try.

Most importantly, Fyodor’s code style was weirdly easy to read, even for a non-programmer hacker hobbyist like myself (I didn’t get my first “real” IT job until 1998, but I did spend quite a bit of time in university computer labs for… reasons).

25 Years of Nmap: Happy Scan-iversary!
A snippet of the original code published in Phrack 51

Smack in the middle, you can see elements like `send_tcp_raw()` (pictured above) that directly reflected the language in the TCP/IP standard, RFC 793, so the code was generally accessible to both hobbyists and professionals who had motivation to figure out how this TCP/IP stuff worked, really.

Incidentally, other projects were also popping off at the time, as well — l0phtcrack (a proprietary utility for recovering passwords) was released a few months before, and Nessus (a little open-source vulnerability scanner) was released a few months after, so there was definitely something in the ether during this 12-month period. Hacker tooling was transforming into infosec tooling, which meant more “luser n00bs,” like myself, could get themselves enmeshed and enamored of the occult magicks of internet technology. Nmap, at least for me, stood out as a true oracle to the weird ways of packet crafting and network sleight-of-hand you could use in fun, unexpected ways to learn about the world.

Happy Scan-iversary, Nmap. Thanks for the cool career.

Additional reading:

NEVER MISS A BLOG

Get the latest stories, expertise, and news about security today.

National Cybersecurity Awareness Month: How Security Pros Can Get Involved

Post Syndicated from Jesse Mack original https://blog.rapid7.com/2021/10/01/national-cybersecurity-awareness-month-how-security-pros-can-get-involved/

National Cybersecurity Awareness Month: How Security Pros Can Get Involved

Fall is a time defined by yearly rituals. For some of us, that means breaking out our favorite knit sweaters, indulging in pumpkin-flavored everything, or — in the immortal words of George Costanza — “shifting into soup mode.”

National Cybersecurity Awareness Month: How Security Pros Can Get Involved

The information security world has its own autumnal observance: National Cybersecurity Awareness Month (NCSAM), promoted each October by the Cybersecurity & Infrastructure Security Agency (CISA). To kick off the 2021 edition, we’re overviewing this year’s themes and providing some ideas to help security professionals make the most of a whole month devoted to their practice.

What’s it all about?

The stated goal of NCSAM is “to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have the resources they need to be safer and more secure online.” Given the growing threat of ransomware and the increased prevalence of high-profile, high-impact data breaches, this year’s installment serves as a much-needed call to focus our collective efforts on security issues.

The numbers bear out the need to shift our combined attention toward security. A stunning 18.8 billion records were breached in the first 6 months of 2021. That’s 2.37 records per individual person living on planet Earth today. In the first half of this year. And of course, these are just the statistics for reported breaches.

We live in a time when digital security is everybody’s business — so it may come as no surprise that CISA’s goal with NCSAM is correspondingly broad and user-centric. The weekly themes for NCSAM 2021 are all about generating smarter and sturdier end-user awareness:

  • Week 1 (10/4-10/10): Be Cyber Smart
  • Week 2 (10/11-10/17): Phight the Phish!
  • Week 3 (10/18-10/24): Explore. Experience. Share. – Cybersecurity Career Awareness Week
  • Week 4 (10/25-10/31): Cybersecurity First

These themes reflect important priorities for cybersecurity awareness. More than 1 in 3 data breaches involves phishing, after all. And given the deepening cybersecurity skills gap, we can all appreciate the push to encourage more people to pursue careers in infosec.

That said, CISA’s focus with these themes is to spread awareness of security concepts among non-expert end users. If you’re an infosec professional, what does NCSAM mean for you?

A practitioner’s approach

For cybersecurity and IT pros, NCSAM presents an opportunity to ensure the non-technical team members at your organization have the basic knowledge and tools they need to maintain security best practices in their day-to-day business activities. October is a good time to:

  • Remind employees how to spot phishing attacks, and explain what to do if they believe they’ve received a phishing email
  • Ensure universal adoption of two-factor authentication for accessing company applications
  • Emphasize the importance of consistent OS and application updates to keep patches up to date
  • Hold a review session of your company’s acceptable use policy for devices, and allow users to ask questions

CISA has put together a wealth of resources that you can use throughout National Cybersecurity Awareness Month to spread security knowledge across your organization. They include ideas for having these conversations with everyone from individual team members to C-level stakeholders and even customers.

Looking ahead

Of course, fall is also about transitions — soup-appropriate temperatures are a reminder that winter’s coming and there’s a new year ahead. That means NCSAM is also a great opportunity for infosec practitioners to reflect on the successes and challenges of 2021 and consider what next year’s cybersecurity priorities will look like.

Throughout October and into the holiday season, we’ll be publishing a range of content about how to prepare your cybersecurity program for 2022. We’ll cover topics like:

  • Moving toward cybersecurity maturity as an organization
  • Tackling the ongoing threat of supply chain risk
  • Considering a zero-trust model for your organization
  • Embracing a security-first culture and getting executive buy-in

Check back with us throughout this month and through the end of the year for more content on these and other cybersecurity planning topics to help you get ready for 2022.

NEVER MISS A BLOG

Get the latest stories, expertise, and news about security today.