[HN Gopher] Infosec Core Competencies
       ___________________________________________________________________
        
       Infosec Core Competencies
        
       Author : kiyanwang
       Score  : 85 points
       Date   : 2021-06-13 10:38 UTC (12 hours ago)
        
 (HTM) web link (www.netmeister.org)
 (TXT) w3m dump (www.netmeister.org)
        
       | unethical_ban wrote:
       | If you get decent at 3/4 of this list, you're in the top 5% of
       | infosec professionals. Not that knowing all of these is bad, but
       | you do not need to have all of these skills to be a well paid,
       | in-demand infosec worker. It also depends on what subfield you're
       | going in.
       | 
       | Are you going to be the only Infosec person at a small company?
       | You need to know a lot more breadth than if you're going to be
       | the email security gateway admin at a behemoth bank.
        
       | tptacek wrote:
       | I'm at bullet one of this list and immediately, entirely
       | skeptical, since that bullet suggests that a common core
       | competency of infosec people is evaluating a CVE by its CVSS
       | score (which, we're told, has meaning relative to your own
       | environment; that's where the art lies, presumably).
       | 
       | But CVSS is an industry-wide joke. It means almost literally
       | nothing (a 9+ is usually, but not always, more severe than a 2).
       | It's a Ouija board, computed by a mysterious calculator and
       | adjusted by imperceptible nudges until the score matches the
       | intuitions of the scorer.
        
         | lucb1e wrote:
         | > a 9+ is usually, but not always, more severe than a 2
         | 
         | which is exactly why learning to read these things (the full
         | vector, I believe is what the author meant rather than just the
         | resulting number) is useful when looking at a list of CVEs.
         | Will it tell you the full story and everything you need to
         | know? Of course not. Will it tell you what the impact for your
         | business situation will be? Nope. Does it help you initially
         | filter out the network-accessible no-privileges-required
         | vulnerabilities that apply to your situation because you aren't
         | local on the host and don't have credentials? Yes, that's where
         | it's helpful.
         | 
         | My employer chose to use CVSS vectors to avoid discussions
         | about whether something should be e.g. low/medium/high impact,
         | and frankly I disagree with them. We still have discussions
         | while it limits our ability to represent the likelihood of
         | exploitation, the impact, or the resulting risk. So I'm fully
         | on board that CVSS is very often not representative, especially
         | the final score but sometimes also it just doesn't ask the
         | right 'questions' (the parameters) to reflect what the problem
         | or impact is. But I can still see what the author meant about
         | reading a CVSS vector specified for a CVE.
        
       | 1MachineElf wrote:
       | Title should be adjusted to the actual title of the blog post:
       | _(Technical)_ Infosec Core Competencies
       | 
       | InfoSec is a management practice. These technical skills are nice
       | to have, but with the exception of #1 (understanding CVEs, CWEs,
       | and CVSSs), you do not need the skills on this list in order to
       | acquire and be productive in an InfoSec job. Someone with these
       | technical skills is cut out to be a security researcher, part of
       | a Red Team, working on the detection side of a SOC, or similar.
       | Those are great and valuable roles, but not quite InfoSec. For an
       | InfoSec job, give me someone who knows security management
       | frameworks, can read security guidance, who can lead on processes
       | we use to manage IT security, who can generate (and optionally
       | build) security status reports, who gets the organizational chain
       | of command for how IT security work gets done.
        
       | lucb1e wrote:
       | This actually helps with impostor syndrome. Not what I came here
       | for, but the effect I notice. Since I've been doing the job, I
       | figured I can pull it off mostly but... it often still feels like
       | I barely know what I'm doing.
       | 
       | Reading this list, the topics are quite varied from network to
       | filesystem to scripting, and yet I'm definitely confident in 47
       | of these 50 topics. Two of the remaining three I can do as
       | specified, but not more deeply. For the final one, I already knew
       | I'm lacking ($cloud vendor specific permission stuff) but I just
       | don't find that area very motivating even if it looks like the
       | established cloud vendors are here to stay. Feels rather dull to
       | memorize vendor-specific words for established techniques and
       | learn platform-specific attacks like the metadata service on AWS.
       | 
       | Anyway, it also seems like a good list (nice to say when you just
       | said you know basically all of this? heh), because the topics are
       | so varied yet it seems to aptly cover what I indeed use in daily
       | work. Some points are more rare of course, like PMS logging for
       | Wireshark (most of the time you do MITM rather than make the
       | client log decryption keys), but still good to know of. I will
       | probably refer to this next time someone asks me how to get into
       | security! My answers to that question were previously quite
       | basic, like just read up on attacks for the systems you're
       | interested in or familiar with, or start with the OWASP top 10 if
       | you don't know where to start. Then again, this list might also
       | seems daunting if you need to ask the question of how to get
       | started, hmm.
       | 
       | One thing to perhaps add would be subnetting / network isolation.
       | It's not something you need in every assignment, but more often
       | than you might think. Even if you do a simple web assignment and
       | you find an SSRF through which you can obtain something
       | important, being able to explain what isolation they are lacking
       | and how it's supposed to be implemented without being able to
       | bypass e.g. the VLAN tagging is helpful to your client (even if
       | only the most high-security organisations care to properly
       | implement it). The list mentions CIDRs, but knowing that there
       | exists such a thing as IP ranges is of course not the whole
       | story.
       | 
       | Also, the number of times the customer came with an isolated
       | offline environment for either exams or sensitive systems... with
       | a recursive DNS resolver... But I suppose #22 could cover that
       | even if it doesn't specifically mention DNS tunneling.
        
       | easterncalculus wrote:
       | I like the objective of this article and most of what's in it but
       | I think it leaves itself open to criticism.
       | 
       | I have doubts about the benefit of even implying a sense of
       | objectivity to these so-called requirements because infosec is
       | such a wide field and people from all over can and do never deal
       | with a lot of these things.
       | 
       | A lot of folks in the industry would say that this lacks mention
       | of LDAP, SAML, and other key protocols. Many folks would say that
       | this is a very *NIX-centric list of utilities, or will work an
       | entire career and never even see SPF or DNSSEC. Many pentesters
       | would say that your understanding of security is only as good as
       | your knowledge of how to break it, and insist on many more
       | vulnerability types and tools as "core competencies" to this
       | list. There's plenty of work being done in securing smart
       | contracts and other cryptocurrency systems, so it's clearly
       | opinion to insist on people avoiding it. Personally speaking, I
       | think the insistence that there are tons of cryptocurrency people
       | that don't know what cryptography is melodramatic and at some
       | level not really possible. The idea of said people not knowing
       | even what cryptography is while evangelizing about it is a
       | contradiction. At this point most folks' beliefs on it are
       | heavily correlated to personal politics, from people condemning
       | or proclaiming it. That's a whole other topic, which is another
       | reason why any binding opinions on it are not something I would
       | include in an infosec core competencies list.
       | 
       | All this being said, I think getting to a consensus on what to
       | learn is a good idea, and there are plenty of things that I
       | personally agree with in this list, many or most of them even.
       | The author is clear and up-front about it being based on his
       | experience, but it appears pretty heavily so. It's still good,
       | but I think this list would be better as a Git repository than a
       | blog post.
        
       | hirako2000 wrote:
       | While I agree with the bag of technical knowledge desirable for
       | an infosec job, it's worth noting that many who hold such role
       | have pivoted from another more or less technical field of work. A
       | software developer who got familiar with networking, crypto,
       | pentesting along the years makes a smooth transition within the
       | same company, ramps up with the details in a few weeks and
       | proudly wears the hat. Similarly, devops/cloud/site reliability
       | enginners, and more commonly sysadmins, and security consultants
       | have an easy time transitioning.
        
       | galacticaactual wrote:
       | This is not a good list.
       | 
       | A better use of time is to internalize the ATT&CK matrix and
       | compose multi-axis controls and detections for each tactic and
       | technique.
        
         | tptacek wrote:
         | I don't really think there are any lists like this that are
         | "good", but I also don't know many people in the field that
         | don't roll their eyes at ATT&CK these days.
        
           | easterncalculus wrote:
           | When it comes to ATT&CK I have personally seen people go
           | 50/50 on it, with most support coming from those in large
           | enterprises. It's a pretty good resource for pentesting or
           | red-team engagements, but probably could use less
           | evangelizing.
        
             | tptacek wrote:
             | I spent from 2005 until ~last year running pentest
             | engagements, for what it's worth.
        
               | easterncalculus wrote:
               | I definitely haven't. Is it something you reference? Some
               | of the technical aspects seem as fine as anything you
               | could google, but the whole kill-chain thing always
               | seemed a little overblown. I agree with your comment
               | about it not benefiting practitioners as much.
        
           | galacticaactual wrote:
           | Is your thesis that spending time analyzing and decomposing
           | TTPs in the framework a waste of time? If it were, I would
           | agree. My assertion is that it is not.
           | 
           | As far as embedding the TTPs in every marketing white paper
           | out there, yeah, agree that's dumb.
        
             | tptacek wrote:
             | I don't love the term "TTP", but I'm not an IR person.
             | 
             | I don't think cataloguing things is intrinsically a waste
             | of time.
             | 
             | I do think that a unified theory of how networks and
             | computers are compromised is a pipe dream that doesn't
             | reward the effort put into building or studying it.
             | 
             | Mostly, I think ATT&CK has done far more good for vendors
             | as the basis for feature/function/benefit breakdowns than
             | it has for practitioners.
             | 
             | Like I said, there are no "good" lists.
        
               | galacticaactual wrote:
               | You have one engineer that you send to enumerate the
               | "Credential Dumping" TTP, read every reference, and model
               | controls and detections. Mimikatz? Great, recompile the
               | source code, modify the args, what's left and how do you
               | protect / detect? DCsync? How does it work? What events
               | are triggered? How do you mitigate through defensive
               | controls?
               | 
               | You have another that you send to read about cached
               | credentials in a textbook.
               | 
               | You're telling me the former does not come out ahead of
               | the latter?
        
               | tptacek wrote:
               | I don't know, maybe most of what you're saying here is
               | that ATT&CK is useful if you're a Windows admin. I may be
               | biased, since I work primarily in software security and
               | vulnerability research, and not IT security.
        
               | galacticaactual wrote:
               | No offense, but your comments are indicative of an epic
               | chasm between the nature of attacks happening on a daily
               | basis at enterprises everywhere and the work being done
               | by many in Infosec, even those held in high regard.
        
               | tptacek wrote:
               | None taken. I mean what I said. If you're an enterprise
               | Windows IT security person, I'm prepared to accept that
               | ATT&CK is important to you as a practitioner. You can
               | tell me that attacks on corporate Windows infrastructure
               | are the most important problem in information security; I
               | won't litigate that.
        
               | lucb1e wrote:
               | > an epic chasm between the nature of attacks happening
               | on a daily basis at enterprises everywhere and the work
               | being done by many in Infosec
               | 
               | Because they're not listening when we tell them to not
               | roll their own crypto!
               | 
               | Or in a more serious tone: organisations often ignore
               | best current practices, even after they spent a lot of
               | money to have us look at their work and we told them what
               | mistakes we found. Maybe we should indeed work more on
               | making it easier to do things right, rather than just
               | telling them how to do it right. It feels a bit like how
               | you can at least distribute free needles to avoid
               | infectious diseases when you can't stop people from being
               | addicted to drugs.
               | 
               | Although if you look at pure research (not just advice
               | not being followed), the gap indeed gets even bigger.
               | Things like formal verification is great for academics
               | but what would really help organisations is robust
               | append-only, easy-to-restore backups to recover without
               | paying after their stuff got encrypted again. But that's
               | not sexy clever research, that's just some plumbing.
               | While that sort of plumbing is not typically considered
               | our job as security testers, it would be a solution that
               | can make a real difference when looking at the attacks
               | being done. (Criminals can still try blackmailing, but
               | that seems to be much less lucrative on average, and good
               | backups are also useful for accidental data destruction.)
        
               | lucb1e wrote:
               | > I spent from 2005 until ~last year running pentest
               | engagements, for what it's worth. [1h ago
               | https://news.ycombinator.com/item?id=27494895]
               | 
               | > I don't know, [...] I work primarily in software
               | security and vulnerability research, and not IT security.
               | [52m ago, parent post]
               | 
               | Umm, so do you think IT security (I'd say pentests fall
               | well within IT security, let me know if that's where you
               | disagree) is within your competency or not?
        
               | tptacek wrote:
               | IT security is a different specialization than any sense
               | of the term "pentesting". IT security people engage
               | pentesters, in the same sense that pentesters engage IT
               | infrastructure in order to, like, send emails and stuff.
        
               | lucb1e wrote:
               | Interesting, I do penetration tests as my day job and
               | would therefore say that means I'm working in IT
               | security. But also I'm not a native english speaker so I
               | might just be wrong. Just to make sure, what you call IT
               | security is the securing of IT infrastructure, and what
               | penetration testers do is, well, the testing thereof?
        
               | tptacek wrote:
               | IT security is desktop and corporate infrastructure
               | server security (file servers, email, directory), usually
               | along with corporate network security (very big companies
               | sometimes have distinct network security teams, but if
               | you don't have that, IT security owns network security
               | --- the wifi access points, the access routers, any weird
               | 8021x-type stuff you're doing, etc).
               | 
               | As soon as you move into prod servers you're typically
               | talking about cloud/infrasec people, who are distinct
               | from IT security people. Infrasec: IAM; IT Security:
               | Active Directory.
               | 
               | As soon as you move to actual code that the corporation
               | writes/maintains, you're in appsec. If your IT security
               | group owns appsec, you're not doing appsec.
        
               | OminousWeapons wrote:
               | > I don't know, maybe most of what you're saying here is
               | that ATT&CK is useful if you're a Windows admin
               | 
               | Aren't Windows shops the primary audience for ATT&CK?
        
               | tptacek wrote:
               | They're the primary consumers of it, but I don't think it
               | follows that they're the intended audience for it; ATT&CK
               | is expansive.
        
       | hn8788 wrote:
       | Missing the most important one; being able to communicate
       | security issues to non-security people. It doesn't matter that
       | youre a super hacker if you cant explain why people should
       | listen, or report your findings without the devs feeling like
       | it's a personal attack.
        
         | ozim wrote:
         | I up voted but there is place for super technical people who
         | are not good at explaining.
         | 
         | There is also a lot of place for people who understand stuff
         | technically but are not exploiting boxes days in days out, that
         | can talk and explain in more general terms lots of those
         | things.
        
       | ______- wrote:
       | You also have to have a rebellious and slightly sly streak in
       | you. This helps if you're going to do social engineering. You may
       | have to learn to be more charismatic or learn superficial
       | charm[0] and be able to play people's emotions.
       | 
       | Another thing: some people just fall into
       | blackhat/whitehat/greyhat hacking naturally after learning that
       | Everything is Broken[1].
       | 
       | [0] https://en.wikipedia.org/wiki/Superficial_charm
       | 
       | [1] https://medium.com/message/everything-is-broken-81e5f33a24e1
       | 
       | > Once upon a time, a friend of mine accidentally took over
       | thousands of computers. He had found a vulnerability in a piece
       | of software and started playing with it. In the process, he
       | figured out how to get total administration access over a
       | network. He put it in a script, and ran it to see what would
       | happen, then went to bed for about four hours. Next morning on
       | the way to work he checked on it, and discovered he was now lord
       | and master of about 50,000 computers. After nearly vomiting in
       | fear he killed the whole thing and deleted all the files
       | associated with it. In the end he said he threw the hard drive
       | into a bonfire. I can't tell you who he is because he doesn't
       | want to go to Federal prison, which is what could have happened
       | if he'd told anyone that could do anything about the bug he'd
       | found. Did that bug get fixed? Probably eventually, but not by my
       | friend. This story isn't extraordinary at all. Spend much time in
       | the hacker and security scene, you'll hear stories like this and
       | worse.
        
       ___________________________________________________________________
       (page generated 2021-06-13 23:01 UTC)